NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-8(2)Pre- and Post-transmission Handling

Maintain the {{ insert: param, sc-08.02_odp }} of information during preparation for transmission and during reception.

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Supplemental Guidance

Information can be unintentionally or maliciously disclosed or modified during preparation for transmission or during reception, including during aggregation, at protocol transformation points, and during packing and unpacking. Such unauthorized disclosures or modifications compromise the confidentiality or integrity of the information.

Practitioner Notes

Protect data not just while it is moving across the network, but also at the sending and receiving endpoints before and after transmission. Data should be encrypted before it hits the wire and remain protected after it arrives.

Example 1: Use Microsoft Purview Message Encryption (formerly OME) so emails are encrypted before they leave the sender's mailbox and remain encrypted until the recipient decrypts them. The data is protected at both ends, not just in transit.

Example 2: For file transfers, encrypt files with 7-Zip AES-256 before uploading them to a file sharing service. The file is protected at the source before transmission, during transit, and at rest on the destination server until the recipient decrypts it.