Skip to content

3.13.16 — Encrypt CUI at Rest

Protect the confidentiality of CUI at rest.

CUI must be encrypted on every storage location:

  • Workstations/laptops — BitLocker (Windows), FileVault (Mac). Full disk encryption.
  • Servers — BitLocker for Windows Server, LUKS for Linux. Volume-level encryption.
  • Databases — Transparent Data Encryption (TDE) for SQL Server, equivalent for other databases.
  • Cloud storage — Azure Blob encryption, S3 server-side encryption, with customer-managed keys preferred.
  • Backups — backup media encrypted with the same standards as production data.
  • File shares — SMB 3.0 encryption or file-level encryption via sensitivity labels.

All encryption must use FIPS-validated modules (per 3.13.11). BitLocker in FIPS mode, SQL TDE with FIPS-validated provider, etc.

The assessor will check: Is BitLocker on? On every device? Can you prove it via MDM? Are servers encrypted? Is the database encrypted? What about backups?

The most reliable evidence: an MDM compliance dashboard showing 100% BitLocker coverage across all managed devices.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Is CUI encrypted at rest?Every storage location with CUI has encryption enabled — verified via MDM/compliance dashboard
2Is the encryption FIPS-validated?FIPS mode enabled, validation certificates available

Documents they’ll review: System and communications protection policy; system security plan; system configuration settings showing encryption at rest; MDM compliance reports; database encryption configuration; backup encryption settings; FIPS validation certificates

People they’ll talk to: System or network administrators; personnel with information security responsibilities; database administrators

Live demos they’ll ask for: Encryption verification on workstations, servers, databases; MDM compliance report; backup encryption configuration


These are the actual questions. Have answers ready.

  • “Is BitLocker enabled on all workstations? Show me the compliance dashboard.”
  • “Are your servers encrypted? Show me the configuration.”
  • “Is your database encrypted? What method — TDE, column-level, application-level?”
  • “Are backups encrypted? Show me the backup encryption settings.”
  • “Is the encryption FIPS-validated? Show me the FIPS mode configuration.”
  • “Where are BitLocker recovery keys stored? Show me one.”

Some workstations not encrypted. 98% isn’t 100%. Every CUI device must have BitLocker. Check MDM compliance for the missing 2%.

Server data unencrypted. BitLocker on workstations but server file shares sitting on unencrypted volumes.

Database not encrypted. CUI in SQL Server without TDE. Enable it — it’s a single configuration change for SQL Server.

Backups unencrypted. Production is encrypted but backups are in the clear. Backups contain the same CUI.

FIPS mode not enabled. BitLocker is on but FIPS mode isn’t enabled via GPO. The encryption works but isn’t running in FIPS-validated mode.

Recovery keys lost. BitLocker on but recovery keys not stored centrally. Can’t prove encryption is manageable.



RequirementWhy it matters here
3.13.11 — FIPS or It Doesn’t CountAt-rest encryption must use FIPS-validated modules
3.13.8 — Encrypt in TransitCompanion: this is at rest, that’s in transit
3.8.9 — Protect Your BackupsBackup encryption is part of this requirement
3.1.19 — Encrypt CUI on MobileMobile device encryption — subset of at-rest encryption
3.13.10 — Manage Your KeysKeys for this encryption managed under key management process

Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.


CMMC Practice ID: SC.L2-3.13.16 | SPRS Weight: 1 point | POA&M Eligible: Yes