This objective requires your organization to identify how cryptographic methods are used to protect Controlled Unclassified Information (CUI) during transmission, whether across internal networks, external connections, cloud environments, or remote access tools.