NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-33Transmission Preparation Integrity

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Verify the integrity of data before it is transmitted — ensure nothing has been tampered with between the time it was prepared and the time it is sent.

Example 1: Calculate and verify checksums or hash values for data files before transmitting them. The sender generates an SHA-256 hash, sends the file and hash separately, and the receiver verifies the hash to confirm the file was not altered.

Example 2: Use digital signatures on critical data exports. Before transmitting financial reports or compliance data, sign the file with your organization's code signing certificate. The recipient verifies the signature to confirm both authenticity and integrity.