NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION
SC-13(1) — FIPS-validated Cryptography
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
All cryptography used in the system must be FIPS-validated — meaning the specific software or hardware module has been tested and certified by an accredited lab.
Example 1: Verify that your Windows Cryptographic Providers appear on the NIST Cryptographic Module Validation Program (CMVP) list. Check the certificate number and ensure it covers the algorithms you are using.
Example 2: For third-party encryption products (VPN appliances, database encryption), request the vendor's FIPS 140-2 or 140-3 validation certificate before purchasing. Confirm the certificate is current, not expired or historical.