NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION
SC-33 — Transmission Preparation Integrity
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
Verify the integrity of data before it is transmitted — ensure nothing has been tampered with between the time it was prepared and the time it is sent.
Example 1: Calculate and verify checksums or hash values for data files before transmitting them. The sender generates an SHA-256 hash, sends the file and hash separately, and the receiver verifies the hash to confirm the file was not altered.
Example 2: Use digital signatures on critical data exports. Before transmitting financial reports or compliance data, sign the file with your organization's code signing certificate. The recipient verifies the signature to confirm both authenticity and integrity.