Skip to the content.

What is NIST 800-171?

The NIST 800-171 document is a companion to NIST 800-53 and dictates how contractors and sub-contractors of Federal agencies should manage Controlled Unclassified Information (CUI).

What’s the purpose of NIST 800-171?

One primary goal of NIST 800-171 was to standardize how federal agencies define CUI. This was accomplished by categorizing CUI as any data that is private and sensitive but not classified per U.S. federal law. The NIST SP 800-171 framework establishes specific areas of cybersecurity controls that contractors and partners need to implement to a minimum standard. If you, your company, or any other company you do business with has a federal contract then you’re required to be NIST SP 800-171 compliant.

Who must comply with NIST SP 800-171 requirements?

NIST SP 800-171 compliance is required for non-federal organizations that process, store or transmit CUI.

Examples may include:

### How do organizations prove compliance? While the original NIST SP 800-171 allowed organizations to self-attest to their level of compliance, as of Rev 2, they must undergo evaluations by certified assessors to determine their level of compliance, based on the Cybersecurity Maturity Model Certification (CMMC).

### Controls The NIST 800-171 documentation also supplies a list of the following controls, along with the corresponding compliance requirements:

  1. Access controls: Who has access to data and whether or not they’re authorized.
  2. Awareness and training: Your staff should be adequately trained on CUI handling.
  3. Audit and accountability: Know who’s accessing CUI and who’s responsible for what.
  4. Configuration management: Follow guidelines to maintain secure configurations.
  5. Identification and authentication: Manage and audit all instances of CUI access.
  6. Incident response: Data breach preparedness and response plan protecting CUI.
  7. Maintenance: Ensure ongoing security and change management to safeguard CUI.
  8. Media protection: Secure handling of backups, external drives, and backup equipment.
  9. Physical protection: Authorized personnel only in physical spaces where CUI lives.
  10. Personnel security: Train your staff to identify and prevent insider threats.
  11. Risk assessment: Conduct pen testing and formulate a CUI risk profile.
  12. Security assessment: Verify that your security procedures are in place and working.
  13. System and communications protection: Secure your comms channels and systems.
  14. System and information integrity: Address new vulnerabilities and system downtime.

### The importance and benefits of complying with NIST 800-171 it’s important to comply with NIST 800-171 because it’s a legal requirement to do business with the federal government. Penalties for non-compliance can be quite harsh depending upon the circumstances. If you experience a data breach or hack where CUI is potentially affected, then you’ll likely be investigated and audited by federal officials to determine what went wrong. Aside from the obvious cost associated with both breaches and audits, if you’re found to be non-compliant with NIST 800-171, the government may take one or more of the following steps:

### NIST 800-171 compliance checklist