STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

SC-13

System and Communications ProtectionRev 5system

Cryptographic Protection

Baselines:LowModerateHigh

Control Statement

a. Determine the [Assignment: cryptographic uses] ; and b. Implement the following types of cryptography required for each specified cryptographic use: [Assignment: types of cryptography].

Supplemental Guidance

Cryptography can be employed to support a variety of security solutions, including the protection of classified information and controlled unclassified information, the provision and implementation of digital signatures, and the enforcement of information separation when authorized individuals have the necessary clearances but lack the necessary formal access approvals. Cryptography can also be used to support random number and hash generation. Generally applicable cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. For example, organizations that need to protect classified information may specify the use of NSA-approved cryptography. Organizations that need to provision and implement digital signatures may specify the use of FIPS-validated cryptography. Cryptography is implemented in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.

Related Controls (29)

AC-2AC-3AC-7AC-17AC-18AC-19AU-9AU-10CM-11CP-9IA-3IA-5IA-7IA-13MA-4MP-2MP-4MP-5SA-4SA-8SA-9SC-8SC-12SC-20SC-23SC-28SC-40SI-3SI-7

CCI Identifiers (4)

CCI-001144The information system implements required cryptographic protections using cryptographic modules that comply with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.CCI-002449Defines the cryptographic uses, and type of cryptography required for each use, to be implemented by the system.CCI-002450Implement organization-defined types of cryptography for each specified cryptography use.CCI-004900Determine the organization-defined cryptographic uses.

Linked STIG Checks (200)

Across 109 STIGs. Click to expand.