RSI Security

NIST 800-171 Security Baseline

Ecommerce

For companies looking to contract with the United States Department of Defense (DoD), it’s imperative to make sure your cyberdefenses are up to par. A big part of that is implementing the controls from Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations (SP 800-171), published by the National Institute of Standards and Technology (NIST). And understanding the NIST 800 171 controls is the first step toward compliance.

 

NIST 800-171 Security Baseline

When you work with or for the DoD, your company’s own cybersecurity becomes a matter of national security. The DoD needs to make sure that its supply chain, the industries that make up the Defense Industrial Base sector (DIB), does not compromise Americans’ safety.

In particular, the NIST SP 800-171 exists to safeguard special classes of information:

To protect these forms of information, the NIST SP 800-171 uses a complex set of controls, called “Requirements,” divided out across 14 “Requirement Families.” The bulk of this article will be spent defining each control. But first, let’s take a closer look at the framework’s organization.

 

NIST 800 171 Controls: The Complete Breakdown

The most recent edition of SP 800-171, revision 2, was published in February of 2020. It addresses requirements for the protection of CUI laid out in Defense Federal Acquisition Regulation Supplement (DFARS) Clause 252.204-7012. It’s also informed by other Federal Information Processing Standards Publications (FIPS) 199 and FIPS 200 and other standards.

The core of NIST SP 800-171 are its 14 Families and 110 Requirements, laid out in Chapter 3. Each Family contains a number of “Basic” Requirements, detailing baseline security practices. Most also have a number of “Derived” Requirements, adding on more nuanced controls.

The enumeration scheme in SP 800-171 reflects Chapter, Family, and respective Requirement. Thus, NIST 800 171 control 3.1 1 is thus the first Requirement, reflecting Chapter 3, Family 1, and Requirement 1 within Family 1. The numbers are not cumulative and can be hard to follow; NIST 800-171 control 3.5.2 and NIST 800-171 control 3.5.3 are #45 and #46, respectively.

Now, let’s take a close look at all of them to understand what implementation entails.

 

Access Control Requirements

Basic Access Control security Requirements include:

 

 

Derived Access Control security Requirements include:

 

 

Request a Free Consultation

 

Awareness and Training Requirements

Basic Awareness and Training Security Requirements include:

There is just one derived Awareness and Training security Requirement:

 

Audit and Accountability Requirements

Basic Audit and Accountability security Requirements include:

Derived Audit and Accountability security Requirements include:

 

 

Configuration Management Requirements

Basic Configuration Management security Requirements include:

Derived Configuration Management security Requirements include:

 

Identification and Authentication Requirements

Basic Identification and Authentication security Requirements include:

 

Derived Identification and Authentication security Requirements include:

 

 

Incident Response Requirements

Basic Incident Response security Requirements include:

 

There is just one derived Incident Response security Requirement:

 

Maintenance Requirements

Basic Maintenance security Requirements include:

Derived Maintenance security Requirements include:

 

Media Protection Requirements

Basic Media Protection security Requirements include:

Derived Media Protection security Requirements include:

 

Personnel Security Requirements

Basic Personnel Security Security Requirements include:

There are no derived Personnel Security Requirements.

 

Physical Protection Requirements

Basic Physical Protection security Requirements include:

Derived Physical Protection security Requirements include:

Risk Assessment Requirements

There is just one basic Risk Assessment security Requirement:

And there are two derived Risk Assessment security Requirements:

 

Security Assessment Requirements

Basic Security Assessment security Requirements include:

There are no derived Security Assessment security Requirements.

 

System and Communications Protection Requirements

Basic System and Communications Protection security Requirements include:

Derived System and Communications Protection security Requirements include:

 

System and Information Integrity Requirements

Basic System and Information Integrity security Requirements include:

Derived System and Information Integrity security Requirements include:

 

Ensuring NIST 800-171 Compliance

Having a deep understanding is a prerequisite to NIST 800-171 compliance. But implementing all 110 Requirements is about more than just knowing them back and forth. You also need to have the expertise and resources in place to ensure the long-term maintenance of every control.

For example, consider NIST 800-171 control 3.12.4, related to “system security plans” and “system boundaries.” These are likely to change over time as your company grows. So, what it takes to implement it a year from now might drastically outweigh what it takes to implement it right now. Plus, you also have to worry about other regulatory frameworks, like the CMMC.

That’s why your best bet for long term compliance, with everything you need to be a DoD contractor, is RSI Security’s NIST 800-171, DFARS, and CMMC services. Our experts will work with you to craft a planned walk through every stage of certification. We’re here for the long hall.

Contact RSI Security today to see how simple implementing NIST 800 171 controls can be!

 

 

Exit mobile version