Compliance Dashboard

Compliance Summary

Compliant

0

Non-Compliant

0

Partially Compliant

0

Not Applicable

0

Compliance by Category

Overall Compliance Status

Access Control

Access control ensures that only authorized users have access to information and that these users only have access to the specific information they need to perform their job functions. These requirements focus on account management, access enforcement, flow control, and separation of duties.

3.1.1 Basic
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).

Explanation: This requirement ensures that only authenticated and authorized entities can access your systems. Implement user authentication, role-based access controls, and device authentication mechanisms.

Implementation Tips:

  • Maintain an inventory of authorized users and devices
  • Implement centralized authentication (e.g., Active Directory, LDAP)
  • Configure firewalls to allow only authorized connections
  • Remove default/guest accounts or implement strong controls on them
3.1.2 Basic
Limit information system access to the types of transactions and functions that authorized users are permitted to execute.

Explanation: Beyond just controlling who can access systems, this requirement focuses on what specific actions those users can perform once logged in. This is often called "least privilege" - users should only have the minimum permissions needed to do their jobs.

Implementation Tips:

  • Implement role-based access controls (RBAC)
  • Document required job functions and map to minimum necessary permissions
  • Regularly review user permissions to ensure they match job needs
  • Configure applications to enforce function-level restrictions
3.1.3 Basic
Control the flow of CUI in accordance with approved authorizations.

Explanation: This control requires organizations to regulate where CUI (Controlled Unclassified Information) can flow within their network and information systems, ensuring it only moves through approved channels and to authorized destinations.

Implementation Tips:

  • Implement content filtering, data loss prevention (DLP) solutions
  • Configure access control lists (ACLs) to restrict data flows
  • Segment networks and restrict traffic between segments
  • Document approved data flow authorizations in a data flow diagram
3.1.4 Basic
Separate the duties of individuals to reduce the risk of malevolent activity without collusion.

Explanation: Separation of duties prevents any single individual from having complete control over critical functions or processes. This reduces the risk of fraud, sabotage, or error by requiring multiple people to complete sensitive actions.

Implementation Tips:

  • Identify critical business processes and separate key steps among different staff
  • Ensure administrators don't have end-user permissions and vice versa
  • Separate development, testing, and production environments
  • Document separation of duties in job descriptions and access control policies
3.1.5 Basic
Employ the principle of least privilege, including for specific security functions and privileged accounts.

Explanation: The principle of least privilege means giving users only the minimum level of access necessary to perform their job functions. This significantly reduces the potential damage from accidents or malicious behavior.

Implementation Tips:

  • Review all privileged accounts and ensure they're necessary
  • Use non-privileged accounts for routine activities
  • Implement time-limited elevated privileges when needed
  • Remove unnecessary software and disable unneeded services/features
3.1.6 Basic
Use non-privileged accounts or roles when accessing nonsecurity functions.

Explanation: This requirement emphasizes that users should perform routine, non-security functions using standard user accounts. Privileged accounts should only be used when performing security-related or administrative tasks that specifically require elevated privileges.

Implementation Tips:

  • Provide separate accounts for administrative and regular duties
  • Configure workstations to prevent privileged users from accessing email or browsing the web
  • Use technical controls to enforce privilege limitations
  • Maintain procedures for when and how to use privileged accounts
3.1.7 Basic
Prevent non-privileged users from executing privileged functions and audit such actions.

Explanation: This control ensures that standard users cannot perform administrative or security-critical functions. If elevated privileges are needed, this should be carefully managed and all such actions should be logged for security review.

Implementation Tips:

  • Configure access controls to prevent privilege escalation
  • Implement privilege management solutions like sudo for Unix systems
  • Use Windows UAC or similar controls for workstations
  • Set up logging and alerting for attempted privilege escalations
3.1.8 Basic
Limit unsuccessful logon attempts.

Explanation: This control helps prevent brute force password attacks by limiting the number of failed login attempts before an account is locked or additional authentication is required.

Implementation Tips:

  • Configure systems to lock accounts after 3-5 unsuccessful login attempts
  • Implement progressive delays between login attempts
  • Set automatic unlock after a defined period (e.g., 15-30 minutes)
  • Establish procedures for handling legitimate lockouts
3.1.9 Basic
Provide privacy and security notices consistent with applicable CUI rules.

Explanation: Users must be informed about their privacy and security responsibilities when accessing systems that contain CUI. These notices serve both as reminders of obligations and can provide legal protection.

Implementation Tips:

  • Implement login banners for all system access points
  • Develop notices that clearly explain handling requirements for CUI
  • Include statements about monitoring, authorized use, and penalties for misuse
  • Ensure banners are consistent with your organization's policies and legal requirements
3.1.10 Basic
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.

Explanation: This control prevents unauthorized access to systems when legitimate users are away from their workstations. After a period of inactivity, screens should be locked and any displayed information should be hidden.

Implementation Tips:

  • Configure systems to lock after 10-15 minutes of inactivity
  • Ensure screen content is not visible during lock state
  • Require re-authentication to unlock the session
  • Train users to manually lock screens when leaving workstations (e.g., Windows Key+L)
3.1.11 Basic
Terminate (automatically) a user session after a defined condition.

Explanation: Beyond just locking screens, this control requires systems to automatically end user sessions based on various conditions such as extended inactivity, time-of-day restrictions, or security risk indicators.

Implementation Tips:

  • Identify appropriate session termination conditions for your environment
  • Configure automatic logout after extended inactivity (e.g., 30-60 minutes)
  • Implement time-of-day restrictions for sensitive systems
  • Ensure applications gracefully handle session terminations to prevent data loss
3.1.12 Basic
Monitor and control remote access sessions.

Explanation: Organizations must have visibility into remote access connections to their systems and the ability to control these sessions. This includes monitoring what remote users are doing and being able to disconnect suspicious sessions.

Implementation Tips:

  • Implement secure remote access solutions (VPN, RDP with MFA, etc.)
  • Log all remote session activities
  • Use session monitoring tools for privileged remote access
  • Document procedures for monitoring and emergency session termination
3.1.13 Derived
Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.

Explanation: Remote access connections must be encrypted to prevent interception of sensitive data in transit. This applies to all remote sessions, including administrative access, VPN connections, and web application access.

Implementation Tips:

  • Use VPN solutions with strong encryption (e.g., IPsec, SSL/TLS)
  • Configure remote desktop tools to use encryption
  • Require HTTPS for web-based administrative interfaces
  • Ensure all remote session tools use up-to-date cryptographic protocols (e.g., TLS 1.2 or higher)
3.1.14 Derived
Route remote access via managed access control points.

Explanation: All remote connections must flow through designated, controlled network access points rather than allowing direct connections to internal systems. This provides a consistent security boundary for monitoring and controlling remote access.

Implementation Tips:

  • Implement VPN concentrators or remote access gateways
  • Configure firewalls to restrict remote access to authorized entry points
  • Use jump servers/bastion hosts for administrative access
  • Document the network architecture showing remote access control points
3.1.15 Derived
Authorize remote execution of privileged commands and remote access to security-relevant information.

Explanation: Organizations must specifically authorize and control when privileged commands can be executed remotely or when security-sensitive information can be accessed remotely. This should not be allowed by default.

Implementation Tips:

  • Develop a formal authorization process for remote privileged access
  • Maintain documentation of authorized remote privileged capabilities
  • Implement technical controls to enforce authorization requirements
  • Log and monitor all remote privileged command execution
3.1.16 Derived
Authorize wireless access prior to allowing such connections.

Explanation: Before wireless connections are allowed to connect to your network, they must be explicitly authorized. This prevents rogue or unauthorized wireless access and ensures all wireless connectivity meets security requirements.

Implementation Tips:

  • Develop and document a wireless access authorization process
  • Implement strong authentication for wireless networks (WPA2/WPA3-Enterprise)
  • Use network access control (NAC) for device validation
  • Maintain an inventory of authorized wireless access points
3.1.17 Derived
Protect wireless access using authentication and encryption.

Explanation: Wireless networks are particularly vulnerable to eavesdropping. This control requires implementing strong authentication to verify user/device identity and encryption to protect data transmitted over wireless networks.

Implementation Tips:

  • Use WPA2 or WPA3 Enterprise with AES encryption
  • Implement 802.1X authentication with strong EAP methods
  • Configure RADIUS servers for centralized authentication
  • Regularly update wireless security configurations as standards evolve
3.1.18 Derived
Control connection of mobile devices.

Explanation: Organizations must establish and enforce security requirements for mobile devices (smartphones, tablets, laptops) that connect to their networks or access CUI. This includes both organization-owned and personal devices.

Implementation Tips:

  • Implement a mobile device management (MDM) solution
  • Develop a BYOD policy if personal devices are allowed
  • Enforce security controls such as encryption, passcodes, and remote wipe capability
  • Restrict mobile device access to sensitive data or systems as appropriate
3.1.19 Derived
Encrypt CUI on mobile devices and mobile computing platforms.

Explanation: Due to the high risk of loss or theft, all mobile devices that store or process CUI must use encryption to protect this data. This includes full disk encryption and application-level encryption when appropriate.

Implementation Tips:

  • Enable full disk encryption on all mobile devices (BitLocker, FileVault, device native encryption)
  • Use container applications to encrypt sensitive data at the application level
  • Implement and enforce encryption through MDM policies
  • Test recovery procedures for encrypted devices
3.1.20 Derived
Verify and control/limit connections to and use of external information systems.

Explanation: Organizations must have policies and controls governing how their systems connect to external systems (partners, cloud services, etc.) and how employees use external systems to access or process CUI.

Implementation Tips:

  • Develop policies for acceptable use of external systems
  • Implement technical controls to monitor and restrict external connections
  • Use data loss prevention (DLP) solutions to control data transfers
  • Maintain an inventory of authorized external system connections
3.1.21 Derived
Limit use of organizational portable storage devices on external information systems.

Explanation: This control restricts how organization-owned storage devices (USB drives, external hard drives) can be used on external systems to prevent data leakage or introduction of malware.

Implementation Tips:

  • Develop policies governing use of portable storage devices
  • Use technical controls such as device encryption and device authentication
  • Consider implementing port control solutions to restrict USB usage
  • Train employees on proper handling of portable storage devices
3.1.22 Derived
Control information posted or processed on publicly accessible information systems.

Explanation: Organizations must have processes to review and approve information before it is posted on public-facing systems (websites, social media) to prevent unauthorized disclosure of CUI or sensitive information.

Implementation Tips:

  • Develop a formal review process for public-facing content
  • Train personnel on identifying information not suitable for public release
  • Implement a content management system with approval workflows
  • Regularly scan public-facing systems for inadvertent exposure of sensitive data

Awareness & Training

Security awareness and training ensures that personnel are adequately trained to carry out their assigned information security-related duties and responsibilities. These requirements focus on making users aware of security risks and providing appropriate training.

3.2.1 Basic
Ensure that managers, systems administrators, and users of organizational information systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of organizational information systems.

Explanation: This requirement establishes that all personnel must be informed about security risks relevant to their roles and the policies and procedures they need to follow to mitigate those risks.

Implementation Tips:

  • Develop role-specific security awareness materials
  • Conduct regular security awareness sessions
  • Use multiple delivery methods (presentations, emails, posters, newsletters)
  • Maintain documentation of awareness activities
3.2.2 Basic
Ensure that organizational personnel are adequately trained to carry out their assigned information security-related duties and responsibilities.

Explanation: Beyond general awareness, this control requires specialized training for personnel with specific security responsibilities. The training should be tailored to their roles and the security functions they perform.

Implementation Tips:

  • Identify personnel with security responsibilities
  • Determine training needs for each security role
  • Develop or procure appropriate training materials and courses
  • Track completion of required training
3.2.3 Derived
Provide security awareness training on recognizing and reporting potential indicators of insider threat.

Explanation: Organizations must train personnel to identify potential insider threats - situations where individuals with authorized access might misuse that access to harm the organization, whether intentionally or unintentionally.

Implementation Tips:

  • Include insider threat topics in security awareness programs
  • Train employees on behavioral indicators that might suggest insider risk
  • Establish clear procedures for reporting suspicious activity
  • Ensure training emphasizes appropriate reporting, not suspicion of colleagues

Audit & Accountability

Audit and accountability controls help organizations maintain a record of system activity by users and processes. These audit records help detect unauthorized activity, identify inappropriate use, and provide evidence for forensic analysis when security incidents occur.

3.3.1 Basic
Create, protect, and retain system audit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate system activity.

Explanation: Organizations must generate audit logs that capture significant system events, securely store these logs, and retain them long enough to support security investigations and compliance requirements.

Implementation Tips:

  • Implement centralized logging for all systems containing or processing CUI
  • Protect audit logs from unauthorized access, modification, or deletion
  • Establish retention policies based on regulatory requirements (typically at least 90 days)
  • Ensure logs include timestamp, user ID, action performed, and success/failure status
3.3.2 Basic
Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.

Explanation: Each user's activities within the system must be attributable to that specific user through audit trails. This requirement supports accountability and non-repudiation principles.

Implementation Tips:

  • Require unique usernames (no shared accounts)
  • Configure logging to record the specific user ID for each action
  • Implement time synchronization across all systems
  • Maintain logs of account creation, deletion, and privilege changes
3.3.3 Basic
Review and update audited events.

Explanation: The set of events that generate audit records should be periodically reviewed and updated to ensure they align with the organization's security needs, threat landscape, and compliance requirements.

Implementation Tips:

  • Establish a process to review audit configuration at least annually
  • Update audited events based on security incidents, risk assessments, and compliance changes
  • Document decisions about which events are audited and why
  • Consider input from security personnel when determining audited events
3.3.4 Basic
Alert in the event of an audit process failure.

Explanation: If the audit logging mechanism fails, organizations must be promptly alerted to prevent prolonged periods without audit capability. Logging failures could indicate technical problems or potential security incidents.

Implementation Tips:

  • Configure monitoring systems to detect audit process failures
  • Set up alerts to notify security personnel of logging failures
  • Document response procedures for audit failures
  • Test audit failure alerts periodically
3.3.5 Basic
Correlate audit record review, analysis, and reporting processes for investigation and response to indications of inappropriate, suspicious, or unusual activity.

Explanation: Audit logs from different systems should be analyzed together to identify security patterns and suspicious behaviors that might not be apparent when examining logs in isolation.

Implementation Tips:

  • Implement Security Information and Event Management (SIEM) tools
  • Establish correlation rules to identify suspicious patterns
  • Create procedures for investigating correlated events
  • Ensure logs from different systems use synchronized time sources
3.3.6 Basic
Provide audit record reduction and report generation to support on-demand analysis and reporting.

Explanation: Systems must be able to process large volumes of audit data and generate meaningful reports that highlight relevant security events without overwhelming analysts with unnecessary details.

Implementation Tips:

  • Implement log management tools with filtering and search capabilities
  • Create predefined reports for common security analyses
  • Enable customized reporting for specific investigations
  • Configure tools to support both routine and ad-hoc analysis
3.3.7 Basic
Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.

Explanation: Accurate time information is critical for audit logs to establish the correct sequence of events during security incidents and to correlate events across different systems.

Implementation Tips:

  • Configure systems to use Network Time Protocol (NTP)
  • Designate authoritative time sources (internal or external)
  • Ensure time synchronization across all systems generating audit data
  • Verify that timestamps include date, time, and time zone information
3.3.8 Derived
Protect audit information and audit tools from unauthorized access, modification, and deletion.

Explanation: Audit data and audit tools themselves must be protected to maintain the integrity and reliability of the audit process. Attackers often attempt to delete or modify audit logs to hide their activities.

Implementation Tips:

  • Restrict access to audit logs using access controls
  • Implement integrity checking for audit files
  • Store audit logs on write-once media or send to a dedicated log server
  • Protect audit tools with strong access controls and integrity monitoring
3.3.9 Derived
Limit management of audit functionality to a subset of privileged users.

Explanation: The ability to configure audit settings, review audit logs, or disable auditing should be restricted to a small number of trusted administrators to prevent tampering with the audit process.

Implementation Tips:

  • Create specific roles for audit management
  • Assign audit management roles only to trusted personnel
  • Use two-person controls for critical audit functions
  • Document and regularly review the list of users with audit privileges

Configuration Management

Configuration management establishes and maintains the integrity of information systems through control of processes for initializing, changing, and monitoring system configurations. These requirements focus on establishing secure baselines and controlling changes to prevent unauthorized modifications that could introduce vulnerabilities.

3.4.1 Basic
Establish and maintain baseline configurations and inventories of organizational information systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles.

Explanation: Organizations must define and document standard secure configurations for their IT systems and maintain comprehensive inventories of all system components. These baselines serve as the foundation for secure configuration management.

Implementation Tips:

  • Develop and document baseline configurations for each type of system
  • Maintain an accurate inventory of all hardware, software, and firmware
  • Update baselines when new technologies are introduced
  • Use automated tools to maintain and verify configurations
3.4.2 Basic
Establish and enforce security configuration settings for information technology products employed in organizational information systems.

Explanation: Beyond establishing baseline configurations, organizations must actively enforce these secure settings. This involves implementing technical controls to prevent deviations from approved configurations.

Implementation Tips:

  • Use security configuration checklists (e.g., CIS benchmarks, DISA STIGs)
  • Implement policy enforcement mechanisms like Group Policy
  • Deploy configuration management tools to monitor and enforce settings
  • Regularly verify that settings remain consistent with security baselines
3.4.3 Basic
Track, review, approve/disapprove, and audit changes to information systems.

Explanation: Organizations need formal change management processes to ensure that all changes to systems are properly reviewed, tested, approved, and documented before implementation to prevent unauthorized or insecure modifications.

Implementation Tips:

  • Implement a formal change management process
  • Document and track all change requests
  • Ensure changes are tested, approved, and reviewed by appropriate personnel
  • Maintain logs of all configuration changes and review them regularly
3.4.4 Basic
Analyze the security impact of changes prior to implementation.

Explanation: Before implementing changes to systems, their potential impact on security must be analyzed to identify any vulnerabilities or weaknesses that might be introduced by the changes.

Implementation Tips:

  • Include security impact analysis in the change management process
  • Develop a checklist for assessing security impacts
  • Ensure security personnel review changes before approval
  • Document security considerations and mitigations for each change
3.4.5 Basic
Define, document, approve, and enforce physical and logical access restrictions associated with changes to the information system.

Explanation: Organizations must control who can make changes to systems by establishing and enforcing access restrictions. This includes both physical access (e.g., server rooms) and logical access (e.g., system privileges).

Implementation Tips:

  • Limit physical access to critical system components
  • Restrict logical access to change management tools and configuration settings
  • Document who is authorized to make different types of changes
  • Ensure separation of duties for change implementation and approval
3.4.6 Basic
Employ the principle of least functionality by configuring the information system to provide only essential capabilities.

Explanation: Systems should be configured to provide only the functions necessary for their intended use. Unnecessary services, protocols, and features should be disabled to reduce the attack surface.

Implementation Tips:

  • Identify and document required system functions
  • Disable or remove unnecessary services, ports, and protocols
  • Use application whitelisting where appropriate
  • Regularly review system functionality to identify and remove unnecessary components
3.4.7 Basic
Restrict, disable, and prevent the use of nonessential programs, functions, ports, protocols, and services.

Explanation: Building on requirement 3.4.6, this control emphasizes the need to actively restrict, disable, or prevent the use of specific nonessential capabilities that could introduce security vulnerabilities.

Implementation Tips:

  • Conduct port scans to identify open ports and running services
  • Use host-based firewalls to restrict port access
  • Implement technical controls to prevent installation of unauthorized software
  • Disable unused features in operating systems and applications
3.4.8 Basic
Apply deny-by-default and allow-by-exception policy to prevent the use of unauthorized software and deny-all, permit-by-exception policy to allow the execution of authorized software.

Explanation: This control requires implementing a "default deny" approach to software execution, where only explicitly approved software is allowed to run. All other software is blocked by default.

Implementation Tips:

  • Implement application whitelisting technologies
  • Establish processes for authorizing and approving software
  • Maintain a list of approved software
  • Configure systems to block execution of unauthorized applications
3.4.9 Derived
Control and monitor user-installed software.

Explanation: Organizations must have mechanisms to control and monitor software that users install on their devices. This prevents the introduction of malware, unauthorized tools, or software with security vulnerabilities.

Implementation Tips:

  • Establish policies regarding user-installed software
  • Implement technical controls to restrict software installation privileges
  • Use software inventory tools to detect unauthorized installations
  • Conduct regular audits of installed software

Identification & Authentication

Identification and authentication controls determine how users and devices identify themselves to systems and how those systems verify their identities. These requirements help ensure that only authorized individuals can access systems containing CUI by verifying their identities before access is granted.

3.5.1 Basic
Identify information system users, processes acting on behalf of users, or devices.

Explanation: This fundamental requirement establishes that all entities (users, processes, or devices) accessing information systems must be identifiable in some way. This allows organizations to attribute actions to specific entities and supports accountability.

Implementation Tips:

  • Assign unique identifiers to all users, processes, and devices
  • Maintain a comprehensive inventory of all authorized system users
  • Ensure service accounts are associated with specific services/processes
  • Implement device certificates or other mechanisms to identify devices
3.5.2 Basic
Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.

Explanation: After identification, the system must verify that the entity is who/what it claims to be before granting access. This verification process is authentication, and it prevents unauthorized access through identity spoofing.

Implementation Tips:

  • Implement strong password policies or other authentication mechanisms
  • Configure systems to require authentication before granting access
  • Use multi-factor authentication where possible
  • Implement device authentication for network access
3.5.3 Basic
Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.

Explanation: This requirement mandates the use of multi-factor authentication (MFA) for privileged accounts in all contexts and for regular user accounts when accessing the network remotely. MFA significantly reduces the risk of credential compromise.

Implementation Tips:

  • Deploy MFA solutions like smart cards, tokens, or authenticator apps
  • Configure all administrator/privileged accounts to require MFA for any access
  • Implement MFA for VPN and remote access solutions
  • Ensure MFA methods use different authentication factors (know/have/are)
3.5.4 Basic
Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.

Explanation: Replay attacks involve capturing authentication data and replaying it later to gain unauthorized access. This requirement mandates using authentication methods that prevent such attacks.

Implementation Tips:

  • Use authentication protocols that include nonces or timestamps
  • Implement TLS/SSL for all authentication traffic
  • Use Kerberos or other protocols with replay protection
  • Implement time-based one-time passwords (TOTP) for sensitive access
3.5.5 Basic
Prevent reuse of identifiers for a defined period.

Explanation: This control prevents reusing user IDs, device identifiers, or process identifiers for a certain period after they're no longer in use. This helps prevent potential confusion or security issues from identifier reuse.

Implementation Tips:

  • Establish a policy defining the waiting period before identifiers can be reused
  • Configure user management systems to prevent immediate reuse of usernames
  • Document procedures for decommissioning and creating identifiers
  • Consider using globally unique identifiers (GUIDs) where appropriate
3.5.6 Basic
Disable identifiers after a defined period of inactivity.

Explanation: Accounts and identifiers that remain unused for extended periods should be disabled to reduce the attack surface. Inactive accounts often have outdated security controls and might not be monitored effectively.

Implementation Tips:

  • Define an appropriate inactivity period (typically 30-90 days)
  • Configure systems to automatically disable inactive accounts
  • Implement a process to periodically review inactive identifiers
  • Document procedures for reactivating needed accounts
3.5.7 Basic
Enforce a minimum password complexity and change of characters when new passwords are created.

Explanation: Password complexity requirements help ensure that user-created passwords resist guessing and brute force attacks. This control requires enforcing minimum complexity standards and ensuring new passwords differ from previous ones.

Implementation Tips:

  • Define password complexity requirements (length, character types, etc.)
  • Configure systems to enforce complexity at password creation
  • Require a minimum number of changed characters in new passwords
  • Consider using passphrases instead of complex passwords where supported

NIST Modern Guidance: The current NIST guidance (SP 800-63B) recommends focusing on password length over complexity, checking passwords against known compromised passwords, and not requiring periodic password changes without reason.

3.5.8 Basic
Prohibit password reuse for a specified number of generations.

Explanation: Password reuse allows attackers who have previously compromised a password to regain access. This control prevents users from cycling through a small set of passwords by requiring a certain number of unique passwords before reuse is allowed.

Implementation Tips:

  • Configure systems to remember password history (typically 5-24 previous passwords)
  • Prevent users from reusing passwords from the history
  • Document the password history requirement in policies
  • Consider implementing password managers to help users maintain unique passwords
3.5.9 Basic
Allow temporary password use for system logons with an immediate change to a permanent password.

Explanation: When temporary passwords are used (e.g., for new accounts or password resets), users should be required to change them immediately upon first logon to maintain security and ensure only the legitimate user knows the password.

Implementation Tips:

  • Configure systems to prompt for password change after temporary password use
  • Ensure temporary passwords are strong and randomly generated
  • Set temporary passwords to expire quickly if not used
  • Train help desk personnel on secure temporary password procedures
3.5.10 Basic
Store and transmit only cryptographically-protected passwords.

Explanation: Passwords must never be stored or transmitted in plaintext. This control requires using cryptographic methods to protect passwords both when stored (e.g., in databases) and when transmitted over networks.

Implementation Tips:

  • Use modern password hashing algorithms (bcrypt, Argon2, PBKDF2) for storage
  • Ensure passwords are transmitted only over encrypted channels (TLS/SSL)
  • Verify that all authentication mechanisms protect password confidentiality
  • Avoid logging or displaying passwords in any form
3.5.11 Basic
Obscure feedback of authentication information.

Explanation: This control prevents authentication information (such as passwords) from being displayed on the screen during entry. This protects against "shoulder surfing" and similar attacks where someone might observe the authentication information.

Implementation Tips:

  • Configure applications to mask password entry (e.g., displaying asterisks)
  • Ensure error messages don't reveal authentication details
  • Hide entered characters on all authentication interfaces
  • Test authentication screens to verify feedback is obscured

Incident Response

Incident response capabilities help organizations detect, report, and respond to security incidents involving CUI. Effective incident handling can minimize loss and destruction, mitigate weaknesses that were exploited, and restore computing services in a timely manner.

3.6.1 Basic
Establish an operational incident-handling capability for organizational information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities.

Explanation: Organizations must have a comprehensive incident response program that addresses all phases of incident handling. This ensures that security incidents are addressed systematically and effectively.

Implementation Tips:

  • Develop a formal incident response plan documenting all phases
  • Establish an incident response team with defined roles and responsibilities
  • Implement detection capabilities (monitoring, alerts, user reporting)
  • Document procedures for analysis, containment, and recovery
  • Create templates for incident documentation and communication
3.6.2 Basic
Track, document, and report incidents to appropriate officials and/or authorities both internal and external to the organization.

Explanation: Organizations must maintain documentation of security incidents and ensure appropriate reporting to management, legal, and relevant external authorities as required by law, regulation, or agreements.

Implementation Tips:

  • Implement an incident tracking system/database
  • Establish reporting thresholds and criteria for escalation
  • Document internal reporting chains and requirements
  • Identify external reporting requirements (e.g., DoD, prime contractors)
  • Create reporting templates for different incident types and authorities

External Reporting Note: Incidents involving CUI in DoD contractor systems must be reported to the DoD within 72 hours of discovery. Check your contracts and agreements for specific reporting requirements.

3.6.3 Basic
Test the organizational incident response capability.

Explanation: Organizations must regularly test their incident response capabilities to ensure they are effective when needed. Testing helps identify gaps and improve response procedures before a real incident occurs.

Implementation Tips:

  • Conduct tabletop exercises to walk through incident scenarios
  • Perform technical exercises or simulations (e.g., red team/blue team)
  • Test communication channels and escalation procedures
  • Document lessons learned and update procedures accordingly
  • Schedule regular testing at least annually

Testing Approaches:

  • Tabletop Exercises: Discussion-based sessions where team members walk through their response to a hypothetical scenario
  • Functional Exercises: Limited simulations testing specific capabilities
  • Full-Scale Exercises: Comprehensive tests that simulate real incidents

Maintenance

Maintenance requirements focus on performing timely and controlled maintenance of information systems to ensure their continued availability and integrity. Proper maintenance procedures help prevent unauthorized modifications during servicing and reduce the risk of introducing new vulnerabilities.

3.7.1 Basic
Perform maintenance on organizational information systems.

Explanation: This fundamental requirement establishes that organizations must perform regular maintenance on their information systems. Maintenance includes hardware servicing, software updates, security patches, and other activities needed to ensure systems remain secure and operational.

Implementation Tips:

  • Develop a maintenance schedule for all system components
  • Implement automated patch management where feasible
  • Document all maintenance activities
  • Include both preventive and corrective maintenance
3.7.2 Basic
Provide effective controls on the tools, techniques, mechanisms, and personnel used to conduct information system maintenance.

Explanation: Organizations must control all aspects of the maintenance process, including tools, techniques, and the personnel performing maintenance. This prevents unauthorized changes or access during maintenance activities.

Implementation Tips:

  • Use only approved maintenance tools and utilities
  • Maintain an inventory of authorized maintenance tools
  • Inspect maintenance tools for malicious code before use
  • Restrict maintenance personnel to only necessary system access
  • Supervise maintenance activities performed by external providers
3.7.3 Basic
Ensure equipment removed for off-site maintenance is sanitized of any CUI.

Explanation: When equipment containing CUI needs to be removed from organizational facilities for maintenance, it must be sanitized to remove any CUI before being taken off-site. This prevents unauthorized access to sensitive information during transit or repair.

Implementation Tips:

  • Develop procedures for sanitizing equipment before off-site maintenance
  • Use secure data wiping tools that meet applicable standards
  • Document the sanitization process for each device
  • Consider using encryption so that sanitization can be accomplished by destroying encryption keys
  • Implement verification procedures to confirm successful sanitization
3.7.4 Basic
Check media containing diagnostic and test programs for malicious code before the media are used in the information system.

Explanation: Media used for diagnostics and testing (like USB drives, DVDs, or external hard drives) can be vectors for malware. This control requires scanning such media for malicious code before using it in organizational systems.

Implementation Tips:

  • Use up-to-date antivirus/anti-malware tools to scan maintenance media
  • Maintain a dedicated scanning station that is not connected to production networks
  • Document media scanning procedures
  • Consider implementing write-once media policies for maintenance tools
  • Verify the source and integrity of diagnostic software before use
3.7.5 Basic
Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete.

Explanation: Remote maintenance sessions must be secured using multifactor authentication to verify the identity of maintenance personnel. Additionally, these connections must be terminated once maintenance is complete to prevent unauthorized access.

Implementation Tips:

  • Configure remote access tools to require MFA for maintenance sessions
  • Implement session timeout for remote maintenance connections
  • Use secure remote access solutions (e.g., VPN with MFA)
  • Document procedures for establishing and terminating remote maintenance sessions
  • Consider using dedicated accounts for remote maintenance activities
3.7.6 Basic
Supervise the maintenance activities of maintenance personnel without required access authorization.

Explanation: When maintenance must be performed by personnel who don't have formal authorization to access the system or CUI, their activities must be supervised by authorized personnel. This ensures that unauthorized access to CUI doesn't occur during maintenance.

Implementation Tips:

  • Designate specific authorized personnel to supervise maintenance activities
  • Document supervision procedures for different types of maintenance
  • Train supervisory personnel on security requirements
  • Maintain logs of maintenance activities performed by unauthorized personnel
  • Ensure supervisors have authority to terminate activities if security concerns arise

Media Protection

Media protection requirements focus on protecting information system media containing CUI, both digital and non-digital. These controls address the secure handling, storage, transport, and disposal of media to prevent unauthorized access, disclosure, or destruction of CUI.

3.8.1 Basic
Protect (i.e., physically control and securely store) information system media containing CUI, both paper and digital.

Explanation: This requirement addresses the physical security of media containing CUI. Both digital media (hard drives, USB drives, etc.) and physical media (paper documents) must be physically controlled and stored securely to prevent unauthorized access.

Implementation Tips:

  • Establish secure storage areas for media (locked cabinets, safes, etc.)
  • Implement access controls for storage areas
  • Mark media containing CUI appropriately
  • Maintain inventories of physical media containing CUI
  • Implement check-in/check-out procedures for media access
3.8.2 Basic
Limit access to CUI on information system media to authorized users.

Explanation: Organizations must implement controls that restrict access to media containing CUI to only those individuals who are authorized to access such information. This applies to both the physical media and the information it contains.

Implementation Tips:

  • Implement access control lists for digital media
  • Restrict physical access to media storage locations
  • Use encryption for digital media
  • Maintain records of authorized users
  • Implement procedures to verify authorization before granting access
3.8.3 Basic
Sanitize or destroy information system media containing CUI before disposal or release for reuse.

Explanation: Before disposing of or reusing media that has contained CUI, organizations must either sanitize it (remove all CUI so it cannot be recovered) or destroy the media entirely. This prevents unauthorized access to CUI from discarded or repurposed media.

Implementation Tips:

  • Develop media sanitization and destruction procedures
  • Use methods that comply with NIST SP 800-88 "Guidelines for Media Sanitization"
  • Document the sanitization or destruction of media
  • Verify effectiveness of sanitization techniques
  • Consider using approved third-party media destruction services

Sanitization Methods:

  • Digital Media: Secure wiping, degaussing, or physical destruction
  • Paper Media: Shredding, pulping, or incineration
3.8.4 Basic
Mark media with necessary CUI markings and distribution limitations.

Explanation: Media containing CUI must be appropriately marked to indicate its sensitive nature and any distribution limitations. This helps prevent accidental disclosure by ensuring authorized users are aware of handling requirements.

Implementation Tips:

  • Develop standardized labels and markings for media containing CUI
  • Train personnel on proper marking procedures
  • Ensure markings conform to applicable CUI guidance
  • Implement procedures to verify proper marking before media distribution
  • Consider electronic marking/tagging for digital media where appropriate

Note: CUI markings should follow the guidelines provided by the CUI Registry and any specific agency requirements.

3.8.5 Basic
Control access to media containing CUI and maintain accountability for media during transport outside of controlled areas.

Explanation: When media containing CUI must be transported outside of secure, controlled areas, organizations must implement controls to maintain accountability and prevent unauthorized access during transport.

Implementation Tips:

  • Develop procedures for secure transport of media
  • Use tamper-evident packaging
  • Maintain chain of custody documentation during transport
  • Encrypt digital media containing CUI
  • Use secure courier services or authorized personnel for transport
  • Implement logging and tracking of media movement
3.8.6 Basic
Implement cryptographic mechanisms to protect the confidentiality of CUI stored on digital media during transport unless otherwise protected by alternative physical safeguards.

Explanation: When digital media containing CUI is transported outside of controlled areas, the data should be encrypted to protect its confidentiality. Encryption provides protection if the media is lost or stolen during transport.

Implementation Tips:

  • Use FIPS-validated or NSA-approved encryption solutions
  • Implement full disk encryption for laptops and portable devices
  • Use encrypted USB drives, external hard drives, and other removable media
  • Document encryption requirements in policies and procedures
  • Ensure secure key management for encryption keys

Note: Alternative physical safeguards might include locked containers, secure courier services, or direct hand-carrying by authorized personnel.

3.8.7 Basic
Control the use of removable media on information system components.

Explanation: Organizations must control how removable media (USB drives, external hard drives, etc.) can be used with information systems. This helps prevent data leakage, malware introduction, and other security risks.

Implementation Tips:

  • Develop policies governing the use of removable media
  • Implement technical controls to restrict or monitor removable media use
  • Use port/device control solutions to control USB and peripheral connectivity
  • Maintain an inventory of authorized removable media
  • Consider solutions that restrict what types of files can be copied to removable media
3.8.8 Basic
Prohibit the use of portable storage devices when such devices have no identifiable owner.

Explanation: Organizations must prevent the use of "found" or unidentified portable storage devices. These devices pose security risks as they may contain malware or could be used to exfiltrate data. All allowed storage devices should have an identifiable, authorized owner.

Implementation Tips:

  • Develop and enforce policies prohibiting the use of unauthorized or unidentified storage devices
  • Establish ownership tracking for all authorized portable storage devices
  • Consider implementing device registration or approval processes
  • Use technical controls to enforce device restrictions
  • Train users on the risks of using unknown storage devices
3.8.9 Derived
Protect the confidentiality of backup CUI at storage locations.

Explanation: Backups often contain complete copies of sensitive data and must be protected with the same level of security as the original data. This control ensures that CUI remains protected when stored in backup form, whether on-site or off-site.

Implementation Tips:

  • Encrypt backup media or use encrypted backup solutions
  • Implement physical security controls for backup storage locations
  • Apply access controls to limit who can access backup data
  • Consider cloud backup solutions that offer appropriate security controls
  • Verify security controls at third-party backup storage providers

Personnel Security

Personnel security requirements focus on reducing risks associated with individuals who have access to CUI. These requirements address screening personnel before granting access, ensuring appropriate agreements are in place, and enforcing security requirements during personnel transfers or terminations.

3.9.1 Basic
Screen individuals prior to authorizing access to information systems containing CUI.

Explanation: This requirement ensures that individuals are properly vetted before they are granted access to systems containing CUI. Screening helps identify potential security risks associated with individuals who may have access to sensitive information.

Implementation Tips:

  • Establish personnel screening procedures based on position sensitivity
  • Conduct background checks appropriate to the level of access required
  • Document screening requirements in hiring policies
  • Verify professional credentials, education, and employment history
  • Ensure screening is completed and approved before granting access

Note: Screening requirements may vary based on contract requirements and the sensitivity of the CUI involved.

3.9.2 Basic
Ensure that CUI and information systems containing CUI are protected during and after personnel actions such as terminations and transfers.

Explanation: This control focuses on maintaining security during personnel transitions. When employees leave or change roles, organizations must take steps to ensure continued protection of CUI and prevent unauthorized access by former employees or employees in new roles.

Implementation Tips:

  • Develop standard procedures for handling personnel transitions
  • Implement timely revocation of access for terminated employees
  • Adjust access rights for transferred employees based on new role requirements
  • Conduct exit interviews to remind departing employees of confidentiality obligations
  • Retrieve organizational assets (keys, badges, devices) upon termination
  • Ensure knowledge transfer for critical functions before departure

Physical Protection

3.10.1
Limit physical access to organizational information systems, equipment, and operating environments to authorized individuals.
3.10.2
Protect and monitor the physical facility and support infrastructure for organizational systems.
3.10.3
Escort visitors and monitor visitor activity.
3.10.4
Maintain audit logs of physical access.
3.10.5
Control and manage physical access devices.
3.10.6
Enforce safeguarding measures for CUI at alternate work sites.

Risk Assessment

3.11.1
Periodically assess the risk to organizational operations, assets, and individuals resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI.
3.11.2
Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified.
3.11.3
Remediate vulnerabilities in accordance with risk assessments.

Security Assessment

3.12.1
Periodically assess the security controls in organizational systems to determine if the controls are effective in their application.
3.12.2
Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems.
3.12.3
Monitor information system security controls on an ongoing basis to ensure the continued effectiveness of the controls.
3.12.4
Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems.

System & Communications Protection

3.13.1
Monitor, control, and protect communications at the external and key internal boundaries of information systems.
3.13.2
Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems.
3.13.3
Separate user functionality from system management functionality.
3.13.4
Prevent unauthorized and unintended information transfer via shared system resources.
3.13.5
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
3.13.6
Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
3.13.7
Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks.
3.13.8
Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards.
3.13.9
Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.
3.13.10
Establish and manage cryptographic keys for cryptography employed in organizational systems.
3.13.11
Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.
3.13.12
Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.
3.13.13
Control and monitor the use of mobile code.
3.13.14
Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.
3.13.15
Protect the authenticity of communications sessions.
3.13.16
Protect the confidentiality of CUI at rest.

System & Information Integrity

3.14.1
Identify, report, and correct information and information system flaws in a timely manner.
3.14.2
Provide protection from malicious code at appropriate locations within organizational information systems.
3.14.3
Monitor information system security alerts and advisories and take appropriate actions in response.
3.14.4
Update malicious code protection mechanisms when new releases are available.
3.14.5
Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
3.14.6
Monitor the information system including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.
3.14.7
Identify unauthorized use of the information system.

Plan of Action & Milestones (POA&M) Tracking

POA&M Status Distribution

POA&M Priority Distribution

ID Requirement Weakness Priority Status Responsible Due Date Actions

Documentation & Resources

About NIST 800-171

NIST Special Publication 800-171 provides guidelines for protecting Controlled Unclassified Information (CUI) in non-federal systems and organizations. Compliance with these requirements is mandatory for contractors and subcontractors that process, store, or transmit CUI.

The resources in this section will help you understand, implement, and maintain compliance with NIST 800-171 requirements across your organization, regardless of size or technical maturity.

NIST Official Publications

description

NIST SP 800-171 Revision 2

Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

open_in_new View Document
description

NIST SP 800-171A

Assessing Security Requirements for Controlled Unclassified Information

open_in_new View Document
description

NIST SP 800-172

Enhanced Security Requirements for Protecting Controlled Unclassified Information

open_in_new View Document
description

NIST Handbook 162

NIST MEP Cybersecurity Self-Assessment Handbook For Small Manufacturers

open_in_new View Document
description

DFARS 252.204-7012

Safeguarding Covered Defense Information and Cyber Incident Reporting

open_in_new View Document
description

NIST SP 800-53 Revision 5

Security and Privacy Controls for Information Systems and Organizations

open_in_new View Document
description

NIST SP 800-171B

Protecting CUI in Nonfederal Systems - Enhanced Requirements

open_in_new View Document
description

CMMC Model Documentation

Cybersecurity Maturity Model Certification documentation and resources

open_in_new View Resources

Implementation Guidance

menu_book

NIST 800-171 Quick Start Guide

A concise guide to implementing the basic security requirements

menu_book

Technical Implementation Details

Technical specifications and detailed implementation guidance

menu_book

NIST 800-171 Compliance Roadmap

Step-by-step roadmap to achieve and maintain compliance

menu_book

Cloud Security Implementation Guide

Guidance for implementing NIST 800-171 in cloud environments

menu_book

CUI Identification and Marking Guide

Procedures for identifying and properly marking CUI

menu_book

Small Business Implementation Guide

Tailored guidance for small businesses with limited resources

menu_book

Cost-Effective Security Controls

Implementing NIST 800-171 on a limited budget

menu_book

Small Business Cyber Essentials

Essential cybersecurity practices for small businesses

menu_book

Small Business Technology Selection Guide

Guidance on selecting compliant technology solutions

menu_book

Manufacturing Environment Security Guide

Security controls for manufacturing systems and environments

menu_book

OT/IT Convergence Security Guide

Security guidance for environments with both OT and IT systems

menu_book

Manufacturing Supplier Management

Guidance for managing security requirements with suppliers

menu_book

Defense Contractor Implementation Guide

Comprehensive guide for defense contractors and subcontractors

menu_book

CMMC Alignment Guide

Aligning NIST 800-171 implementation with CMMC requirements

menu_book

Incident Response for CDI

Specialized incident response procedures for Covered Defense Information

menu_book

Healthcare Implementation Guide

Implementing NIST 800-171 in healthcare organizations

menu_book

HIPAA and NIST 800-171 Alignment

Aligning HIPAA Security Rule with NIST 800-171 requirements

menu_book

Medical Device Security Guide

Security guidance for medical device manufacturers

Templates & Tools

description

System Security Plan (SSP) Template

Comprehensive template for documenting your system security plan

open_in_new Create SSP
table_chart

POA&M Template

Excel template for tracking remediation plans with automated metrics

checklist

Security Assessment Report Template

Template for documenting security assessment findings and recommendations

assignment

Security Policy Templates Bundle

Complete set of security policy templates aligned with NIST 800-171

fact_check

Access Control Matrix Template

Template for documenting and managing user access permissions

business_center

Business Impact Analysis Template

Template for identifying critical systems and recovery priorities

shield

Risk Assessment Template

Template for conducting and documenting risk assessments

architecture

System Architecture Documentation Template

Template for documenting system architecture and boundaries

warning

Incident Response Plan Template

Template for developing a comprehensive incident response plan

people

Security Roles & Responsibilities Matrix

Template for defining security responsibilities across the organization

account_tree

Data Flow Diagram Templates

Templates for mapping data flows and identifying control points

Training Materials

school

Security Awareness Training Slides

Comprehensive presentation slides for staff security awareness training

video_library

NIST 800-171 Overview Video

Video introduction to NIST 800-171 requirements and compliance

play_arrow Watch Video
quiz

Security Awareness Quiz

Testing materials to verify security awareness comprehension

integration_instructions

CUI Handling Training

Training on proper identification, marking, and handling of CUI

email

Phishing Awareness Training

Training materials on recognizing and avoiding phishing attempts

home

Remote Work Security Training

Training on securing remote work environments and practices

school

Security Administrator Training

Comprehensive training materials for system administrators

security

Secure Configuration Training

Training on implementing secure configurations for systems and applications

code

Secure Development Training

Training on secure software development practices

report

Incident Response Training

Training on incident detection, response, and recovery

engineering

Security Architecture Training

Training on designing secure system architectures

business

Executive Briefing Slides

Presentation explaining NIST 800-171 compliance for executives

attach_money

Compliance ROI Analysis

Analysis of cost/benefit and ROI for security compliance investments

gavel

Legal and Contractual Obligations

Overview of legal and contractual requirements related to NIST 800-171

insert_chart

Cybersecurity Risk Dashboard

Dashboard template for executive-level risk reporting

Industry Best Practices

lightbulb

NIST 800-171 Implementation Case Studies

Real-world case studies of successful NIST 800-171 implementations

trending_up

Cost-Effective Implementation Strategies

Strategies for implementing NIST 800-171 within budget constraints

compare_arrows

NIST 800-171 and ISO 27001 Integration

Guidance on integrating NIST 800-171 with ISO 27001 implementation

psychology

Building a Security-Aware Culture

Strategies for fostering a security-minded organizational culture

handyman

Security Tool Selection Guide

Guidance on selecting security tools to meet NIST 800-171 requirements

timeline

Compliance Program Maturity Model

Framework for assessing and improving your compliance program maturity

Assessment Resources

fact_check

NIST 800-171 Assessment Methodology

Comprehensive methodology for assessing NIST 800-171 compliance

assignment_turned_in

Self-Assessment Checklist

Detailed checklist for conducting a NIST 800-171 self-assessment

verified

Evidence Collection Guide

Guide for collecting and organizing compliance evidence

bug_report

Vulnerability Assessment Tools

Tools and guidance for conducting vulnerability assessments

compare

Gap Analysis Templates

Templates for conducting and documenting NIST 800-171 gap analysis

directions_run

Security Controls Testing Guide

Guide for testing the effectiveness of implemented security controls

rule

Assessment Scoping Tool

Tool for determining assessment scope and boundaries

Glossary of Terms

CUI (Controlled Unclassified Information)

Information that requires safeguarding or dissemination controls according to applicable laws, regulations, and government-wide policies, but is not classified information.

CMMC (Cybersecurity Maturity Model Certification)

A certification program developed by the Department of Defense to measure a defense contractor's ability to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).

DFARS (Defense Federal Acquisition Regulation Supplement)

A supplement to the Federal Acquisition Regulation (FAR) that provides DoD-specific acquisition regulations. DFARS 252.204-7012 specifically mandates NIST 800-171 compliance for defense contractors.

FCI (Federal Contract Information)

Information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government.

FIPS (Federal Information Processing Standards)

Publicly announced standards developed by the United States federal government for use in computer systems by non-military government agencies and government contractors.

Plan of Action and Milestones (POA&M)

A document that identifies tasks needing to be accomplished to address security gaps. It details resources required to accomplish the elements of the plan, milestones for meeting the tasks, and scheduled completion dates.

System Security Plan (SSP)

A document that provides an overview of the security requirements for an information system and describes the controls in place or planned to meet those requirements.

Security Control

The safeguards or countermeasures prescribed for an information system or an organization to protect the confidentiality, integrity, and availability of the system and its information.

Security Control Assessment

The testing or evaluation of security controls to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome.

Security Domain

A set of systems and applications that are subject to a common security policy and administered by the same entity.

Least Privilege

The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations needed to perform its function.

Multi-factor Authentication (MFA)

An authentication method that requires the user to provide two or more verification factors to gain access to a resource.

Non-repudiation

Assurance that someone cannot deny the validity of something, such as the sender of a message cannot deny having sent the message.

Vulnerability

A weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.

Security Impact Analysis

The analysis conducted by an organizational official to determine the extent to which changes to the information system have affected the security state of the system.

Zebari Group IT Services

If you need additional assistance with your NIST 800-171 compliance efforts, the following consultants and organizations specialize in security compliance services:

Zebari Group IT Services

Specialties: Security Assessments, Implementation Services

Comprehensive NIST 800-171 assessment and implementation services for organizations of all sizes.

open_in_new Visit Website

Frequently Asked Questions

What is NIST 800-171?

expand_more

NIST Special Publication 800-171 is a set of security requirements designed to protect Controlled Unclassified Information (CUI) in nonfederal systems and organizations. These requirements apply to any organization that processes, stores, or transmits CUI through their information systems on behalf of the federal government.

How do I know if my organization needs to comply with NIST 800-171?

expand_more

Your organization needs to comply with NIST 800-171 if it has contracts with federal agencies that involve handling Controlled Unclassified Information (CUI). This includes defense contractors (subject to DFARS 252.204-7012), as well as contractors with other federal agencies that include NIST 800-171 as a requirement in their contracts.

What is the difference between a System Security Plan (SSP) and a Plan of Action & Milestones (POA&M)?

expand_more

A System Security Plan (SSP) documents how your organization implements the security requirements and controls. It describes your system environment, security controls, and procedures in place.

A Plan of Action & Milestones (POA&M) documents instances where you are not yet fully compliant with requirements. It outlines your plan for achieving full compliance, including specific tasks, responsibilities, resources needed, and completion dates.

How often should we review our NIST 800-171 compliance?

expand_more

NIST recommends continuous monitoring of security controls with formal assessments conducted at least annually. Additionally, you should review your compliance whenever there are significant changes to your systems, organizational structure, or when new threats emerge.

What is Controlled Unclassified Information (CUI)?

expand_more

Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls according to applicable laws, regulations, and government-wide policies, but is not classified information. Examples include technical drawings, contract information, research data, privacy information, and proprietary business information.

Do I need to implement all 110 security requirements?

expand_more

Organizations are expected to implement all applicable security requirements. However, some requirements may not be applicable to your specific environment. In such cases, you must document the rationale for why a requirement is not applicable in your System Security Plan (SSP).

What is the relationship between NIST 800-171 and CMMC?

expand_more

The Cybersecurity Maturity Model Certification (CMMC) is built upon NIST 800-171 requirements but adds a maturity model approach and third-party certification requirement. CMMC Level 2 closely aligns with NIST 800-171, while higher levels add additional requirements beyond those in NIST 800-171.

Can I outsource my NIST 800-171 compliance efforts?

expand_more

While you can engage consultants to assist with assessment, documentation, and implementation, the ultimate responsibility for compliance remains with your organization. Outsourcing specific IT functions doesn't transfer compliance responsibility. Your organization must maintain oversight and ensure all requirements are met, regardless of who performs the technical implementation.

How do I determine the scope of my NIST 800-171 compliance efforts?

expand_more

The scope should include all systems and environments that process, store, or transmit CUI. This may involve network segments, specific systems, or entire environments depending on how CUI flows through your organization. Proper scoping is critical to managing compliance effectively without unnecessarily expanding the compliance boundary.

What are the penalties for non-compliance with NIST 800-171?

expand_more

Non-compliance can result in contract termination, financial penalties, loss of future contract opportunities, and potential legal action. For DoD contractors, non-compliance with DFARS 252.204-7012 (which mandates NIST 800-171) can be treated as a breach of contract. Additionally, misrepresenting compliance status could potentially lead to False Claims Act violations.

check_circle
Success
Operation completed successfully.
close