During a CMMC Level 2 assessment, a CCA is evaluating whether the organization meets the requirement to “Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.” According to the CMMC requirement, the CCA must determine whether FIPS-validated cryptography is employed to protect the confidentiality of CUI. Which assessment procedure would the CCA most likely use to evaluate this requirement?
Submit