NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION
SC-8(2) — Pre- and Post-transmission Handling
Maintain the {{ insert: param, sc-08.02_odp }} of information during preparation for transmission and during reception.
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Supplemental Guidance
Information can be unintentionally or maliciously disclosed or modified during preparation for transmission or during reception, including during aggregation, at protocol transformation points, and during packing and unpacking. Such unauthorized disclosures or modifications compromise the confidentiality or integrity of the information.
Practitioner Notes
Protect data not just while it is moving across the network, but also at the sending and receiving endpoints before and after transmission. Data should be encrypted before it hits the wire and remain protected after it arrives.
Example 1: Use Microsoft Purview Message Encryption (formerly OME) so emails are encrypted before they leave the sender's mailbox and remain encrypted until the recipient decrypts them. The data is protected at both ends, not just in transit.
Example 2: For file transfers, encrypt files with 7-Zip AES-256 before uploading them to a file sharing service. The file is protected at the source before transmission, during transit, and at rest on the destination server until the recipient decrypts it.