SC.L2-3.13.11

Originally published at: SC.L2-3.13.11 - CMMC 2.0 Control Explorer - GRC Academy

Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.