RSI Security

How to Map NIST Cybersecurity Framework Controls

tool

To work with the US government, organizations need to implement NIST frameworks like the CSF. NIST SP 800-53 maps CSF principles into executable controls, which then translate into requirements in other frameworks, like SP 800-171, that are required for specific contracts.

Need help mapping NIST Cybersecurity Framework Controls? Schedule a consultation today. 

 

NIST Cybersecurity Framework and SP 800-53

The National Institute of Standards and Technology (NIST) first published its Framework for Improving Critical Infrastructure Cybersecurity in 2014, with a major update (Version 1.1) in 2018. Version 2.0 is currently in production and expected in early 2024. Better known as the Cybersecurity Framework (CSF), it is a foundational text that sketches out the general NIST approach to cybersecurity. It also serves as the basis for all other NIST security frameworks.

Another foundational text in that respect is NIST Special Publication (SP) 800-53, Security and Privacy Controls for Information Systems and Organizations. SP 800-53 takes the general concepts and approaches in the CSF and translates them into specific controls. Understanding how to map CSF controls generally means mapping from SP 800-53 to another framework.

 

NIST SP 800-53 to NIST SP 800-171 Mapping

Organizations seeking contract work with the US government often come into contact with Controlled Unclassified Information (CUI). As such, they typically need to implement and assess controls from NIST SP 800-171, Protecting CUI in Nonfederal Systems and Organizations.

NIST SP 800-171 comprises 110 individual Requirements, organized across 14 Families. Some Requirements are Basic, covering fundamental, often simple protections. Others are Derived, prescribing specific and often complex safeguards against the most insidious threats to CUI.

All controls in this document are directly adapted from the SP 800-53 and NIST CSF frameworks. So, organizations that are familiar with SP 800-53 and have implemented its controls can follow SP 800-171’s guidance on mapping to streamline their assessments.

Below is a breakdown of each Requirement Family’s Basic and Derived requirements and how they map onto specific NIST SP 800-53 Controls, organized by their codenames in 800-171.

 

Request a Consultation

 

Mapping Access Control Requirements

Access Control (AC) is one of the largest Requirement Families in SP 800-171, concerning protections that limit and control users’ access to systems containing or connected to CUI.

There are two Basic AC Requirements, which map together collectively:

In addition, there are 20 Derived AC Requirements, which map as follows:

 

Mapping Awareness and Training Requirements

Awareness and Training (AT) Requirements govern how organizations should train their staff about CUI handling and safety. It comprises two Basic Requirements, which map together:

There is also one Enhanced AT Requirement, which maps as follows:

 

Mapping Audit and Accountability Requirements

There are two Basic Audit and Accountability (AU) Requirements, which establish general standards for regular self-auditing and audit log protocols. These Requirements map together:

There are also seven Enhanced AU Requirements, which map as follows:

 

Mapping Configuration Management Requirements

Configuration Management (CM) concerns the setup and ongoing maintenance of settings on software and hardware. There are two Basic CM Requirements, which map together:

There are also seven Derived CM Requirements, which map as follows:

Mapping Identification and Authentication Requirements

Identification and Authentication (IA), like AC, governs practices for ensuring that users who can access sensitive data are who they say they are and have the appropriate authority to do so.

The two Basic IA Requirements map together:

And there are nine Derived IA Requirements, which map as follows:

NOTE: Control IA-2(8) was recently added to the SP 800-53 framework. Organizations that implemented SP 800-53 controls prior to 2020 may not have its protections accounted for.

 

Mapping Incident Response Requirements

Incident Response (IR) governs how organizations should respond to events such as attacks or data breaches impacting CUI. There are two Basic IR Requirements, which map together:

There is also just one Derived IR Requirement, which maps as follows:

 

Mapping Maintenance Requirements

Maintenance (MA) concerns the long-term management of software and hardware that process CUI. As with all other Families, the two Basic MA Requirements map together:

And the four Derived MA Requirements map as follows:

Mapping Media Protection Requirements

Media Protection (MP) dictates protections for any media that can access, store, or otherwise come into contact with CUI. It comprises three Basic Requirements, which map together:

There are also six Derived MP Requirements, which map as follows:

 

Mapping Personnel Security Requirements

Personnel Security (PS) governs secure recruitment, hiring, lifecycle management, and termination of staff across two Basic Requirements, which map together as follows:

There are no Derived PS requirements in NIST SP 800-171.

 

Mapping Physical Protection Requirements

Physical Protection (PE) ensures that hardware and environments in which CUI is stored or can be accessed are secure. There are two Basic PE Requirements, which map together:

There are also four Derived PE Requirements, which map as follows:

 

Mapping Risk Assessment Requirements

Risk Assessment (RA) concerns how an organization should monitor for, identify, analyze, and mitigate risks to CUI before they become full-fledged cyber attacks or other security events.

There is one Basic RA Requirement, which maps to one Control:

There are also two Derived RA Requirements, which map in these ways:

 

Mapping Security Assessment Requirements

Security Assessment (CA) governs procedures for testing the functionality and efficacy of organizational security systems. There are four Basic CA Requirements, which map together:

There are no Derived CA Requirements in SP 800-171.

 

Mapping System and Communications Protection Requirements

System and Communications Protection (SC) prescribes safeguards for communications over secure and unknown or unsecured networks. The two Basic SC Requirements map together:

There are also 14 Derived SC Requirements, which map as follows:

 

Mapping System and Information Integrity Requirements

Finally, System and Information Integrity (SI) works alongside CA Requirements to ensure that an organization’s protection systems are functioning as designed and data retains its integrity.

There are three Basic SI Requirements, which map together:

There are also four Derived SI Requirements, which map as follows:

 

Preparing for CMMC and DoD Compliance

Organizations seeking contracts with the Department of Defense (DoD) in particular need to do more than just map controls between publications like NIST cybersecurity framework, 800-53, and 800-171. They need to achieve Cybersecurity Maturity Model Certification (CMMC) up to the Level designated on their contract by implementing practices and then assessing them.

The first two Levels of CMMC require implementing practices adapted from SP 800-171:

CMMC Level 3, “Expert,” will require implementing an unknown number of practices adapted from NIST SP 800-172. That framework builds on the Requirements from 800-171 and adds a total of 35 Enhanced Requirements across a selection of Families. Level 3 organizations will also require triennial, government-led assessments to achieve and maintain certification.

Working with a CMMC advisor is the best way to prepare for and achieve certification.

 

Optimize Your Cybersecurity Implementation

Mapping NIST CSF controls typically involves adapting safeguards prescribed in SP 800-53 to meet the requirements of other frameworks. One of the most widely applicable is 800-171, which covers all organizations that come into contact with CUI. All of its Requirements are mappable to 800-53 Controls, streamlining assessments for DoD and other compliance.

RSI Security helps organizations prepare for DoD and governmental compliance with strategy, initial implementation, mapping, and assessment of cybersecurity infrastructure. We believe that discipline creates freedom, and the right way is the only way to keep your sensitive data safe.

For further assistance mapping controls from the NIST cybersecurity framework, SP 800-53, or other safeguards for SP 800-171 or CMMC implementation, contact RSI Security today!

 

 
 

Download Our Comprehensive Guide to NIST Implementation

Exit mobile version