Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of backup information
.
Guidance:
Note that this enhancement requires the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13.)