RSI Security

NIST 800-171 Assessment Methodology Overview

The Defense Industrial Base (DIB) sector is a vast business network containing some of the most critical infrastructures in the US. Working in partnership with or for the Department of Defense (DoD) as a contractor can be lucrative, but that comes at the cost of high risks to your own company and the safety of all Americans. That’s why you’ll need to ensure compliance with various DoD cybersecurity frameworks, and the NIST 800-171 assessment methodology is a critical first step in that direction. 

Read on to learn more about what NIST 800-171 assessment comprises and why it matters.

 

NIST 800-171 Assessment Methodology Overview

To achieve preferred contractor status with the DoD, you’ll need to be compliant with the NIST SP 800-171 framework and with several other regulatory texts. There are several assessment levels leading up to full compliance, each of which has its particular methodology.

This guide will break down what you need to know about these assessment methodologies, including:

When you’re finished with this article, you’ll know what NIST 800-171 assessment tools and other compliance resources you need to secure preferred contractor status, along with how RSI Security can help.

 

Regulatory Context for DoD Contractors and Beyond

The National Institute of Standards and Technology (NIST) first published Special Publication (SP) 800-171 to meet requirements laid out in the Federal Acquisition Regulation (FAR). This publication was titled Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations.

Clause 252.204-7012 of the Defense Federal Acquisition Regulation Supplement (DFARS) specifies that DoD contractors must protect controlled unclassified information (CUI). This includes many documents protected by laws and regulations but that do not have classified status — for example, “law enforcement sensitive” and “for official use only” data.

Furthermore, DFARS clause 252.204-7008 requires protections for another class of information, known as covered defense information. It includes documents specific and critical to military operations, such as use and repair manuals and technical guidance related to weapons and other defense technologies. It also includes miscellaneous sensitive data, like personnel files.

As we’ll dive into below, the NIST SP 800-171 framework and other regulatory guides ensure this information and other sensitive data are fully protected. Assessment methodologies extend these protections by facilitating accurate and efficient compliance enforcement.

 

Schedule a Free Consultation!

 

Current NIST SP 800-171 Assessment Methodologies

Assessments for NIST SP 800-171 compliance utilize two supplementary documents: DoD Assessment Methodology (Version 1.2) and NIST’s SP 800-171A, “Assessing Security Requirements for Controlled Unclassified Information.” There are three levels of assessment:

Depending on your company’s specific needs and position and the DoD department’s requirements, you may need to achieve a certain confidence level in your NIST SP 800-171 Assessment. Many companies will first start with a basic or self-assessment before moving onto more suitable medium or high-level ones. The project your company is hired for dictates the confidence level needed.

NIST SP 800-171 Assessment Scoring Methodology 

Regardless of your company’s assessment level to gauge its implementation of NIST SP 800-171, the scoring metrics used are the same. Each control successfully implemented in full receives a value of one point, adding up to a total of 110 points for all 110 controls. Nearly all controls are scored either fully or not at all, with partial scoring applicable only to a select few controls and only in exceptional cases. Controls missed result in subtractions.

Specific controls are considered higher leverage than others, resulting in net subtractions of more than one point. These all fall into three distinct categories and respective point totals:

To understand how this scoring system works in the context of the NIST SP 800-171 assessment, it’s helpful to know what the precise controls are and how they fit within the scheme.

 

Understanding the NIST SP 800-171 Framework

Assessment is the final consideration for NIST SP 800-171 compliance. Before you get ready for assessment, you’ll need to strategically implement the framework and its many controls. As noted above, SP 800-171 comprises 110 total cybersecurity controls, which are labeled “Requirements” within the scheme. These are distributed across 14 “Requirement Families” domains or cybersecurity categories that interlock to keep all CUI and CDI secure.

Currently, NIST SP 800-171 is in Revision 2, which is up to date as of February 2020. In the framework document, each individual Requirement accompanies an explanatory guide offering a descriptive (not prescriptive) example of how it can be implemented.

 

SP 800-171 Requirement Families and Requirements

The full breakdown of 110 Requirements across the 14 Families is as follows:

Critically, these controls are not the only ones prospective DoD contractors will have to implement and assess. There is also another, more comprehensive framework.

Other Requirements for Potential DoD Contractors

If you hope to secure DoD contracts, you’ll also need to achieve Cybersecurity Model Maturity Certification (CMMC). This entails compliance with a new, comprehensive omnibus framework published by the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD-A&S). The CMMC builds on and incorporates all NIST SP 800-171 controls into its scheme and several other controls based on NIST and other cybersecurity frameworks.

Critically, the assessment methodology for the CMMC is drastically different from that of NIST SP 800-171, detailed above. Rather than a tiered approach to assessment and trust level assured, the framework involves tiered compliance levels (see below). These levels are assessed and certified by an external entity known as a Certified Third-Party Assessment Organization (C3PAO), which is itself accredited by the CMMC Accreditation Body (CMMC-AB).

 

How the CMMC Framework Builds Upon NIST SP 800-171

Unlike NIST SP 800-171, which is expected to be adopted wholly and assessed as such, the CMMC framework facilitates adoption across five “Maturity Levels,” each increasing level furthering security:

Across these levels, companies will implement 171 controls, encompassing all of NIST SP 800-171 (by Level 3) and other controls. These are distributed across “Domains,” which correspond roughly to SP 800-171’s Requirement Families, except for three outliers:

Even though the CMMC facilitates adoption with its tiered approach, implementing all of its Practices to full DoD requirements can still be challenging, especially for smaller companies with modest IT budgets. That’s why the best C3PAOs help at all stages, not just assessment.

 

Professional SP 800-171 Compliance and Cybersecurity

RSI Security offers a suite of DoD compliance services, including flexible and scalable advisory for NIST SP 800-171 assessment and CMMC certification. No matter where you are on your journey toward certification and preferred contractor status with the DoD, we’re happy to help you get to the next step. Our expert team has helped businesses of all sizes win DoD contracts and satisfy all other compliance and cybersecurity needs for over a decade.

First, we help your internal team build out or refresh its cybersecurity architecture up to DFARS specifications. Then, once you’re ready, we’ll walk you through all elements of the assessment.

To recap from above, the NIST 800-171 assessment methodology your company will need to implement for compliance comprises three assessment levels (basic, medium, and high). This can be conducted either internally or with the help of a DoD-approved specialist. Regardless of what level you choose, the scoring matrix stays the same — you’re aiming for a perfect score of 110. To see how simple assessment, compliance, and security can be, contact RSI Security today!

 

 

Exit mobile version