NIST Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations (NIST SP 800-171 or NIST 800-171), provides federal agencies with a set of guidelines designed to ensure that Controlled Unclassified Information (CUI) remains confidential and unchanged in nonfederal systems and organizations.
The protection of CUI is of paramount importance to federal agencies and can directly impact their ability to conduct their assigned missions and business operations successfully.
Specifically, NIST SP 800-171 provides a set of recommended security requirements for protecting the confidentiality of CUI that:
The security requirements are intended for use by federal agencies in contractual vehicles or agreements established between those agencies and nonfederal organizations.
Today, more than any time in history, the U.S. government relies on external service providers to carry out a wide range of missions and business functions.
For example, many federal contractors routinely process, store and transmit sensitive information in their systems to support the delivery of products or services to federal agencies.
Additionally, federal information is frequently provided to or shared with state and local governments, colleges, universities and independent research organizations.
NIST SP 800-171 is important because it is designed to protect sensitive federal information residing in third-party vendors, government contractors or service providers.
This is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfully carry out its designated missions and business operations, including those related to critical infrastructure.
Previous OPSEC failures have shown us sensitive data can be grouped together to illuminate otherwise clandestine plans.
NIST SP 800-171 is more than a set of best practices; it's a mandatory compliance requirement for Department of Defense (DoD) contractors via DFARS (Defense Federal Acquisition Regulation Supplement), and a contractual obligation for many other federal agencies. Failure to comply carries significant repercussions:
In the broader security landscape, NIST SP 800-171 is viewed by experts as the essential security baseline for protecting CUI across the non-federal supply chain.
Compliance with 800-171 is also the crucial first step toward meeting the evolving, more rigorous requirements of the Cybersecurity Maturity Model Certification (CMMC). The CMMC Level 2 assessment, for instance, is built almost entirely upon the 110 security controls detailed in NIST SP 800-171. Therefore, achieving 800-171 compliance is a prerequisite for long-term participation in the Defense Industrial Base (DIB).
NIST SP 800-171 was created to provide guidelines around security requirements for protecting Controlled Unclassified Information (CUI).
It does this by providing a set of 14 security requirement categories that support the development of secure and resilient data processing.
These security controls are operational, technical and management safeguards, that when used, maintain the confidentiality, integrity and availability and prevent unauthorized access of sensitive information.
This approach is designed to help nonfederal entities to comply with the security requirements using the systems and practices they already have in place, rather than trying to use government-specific approaches.
These security requirements apply to any component of non-federal systems and organizations that process, store, or transmit CUI, or provide security protection for such components.
Note: The term' information system' has been replaced by 'system' to reflect a more broad-based, holistic definition that encompasses general-purpose information systems, industrial and process control systems, cyber-physical systems, and individual devices that are part of the Internet of Things (IoT).
NIST SP 800-171, like NIST SP 800-53, is part of the NIST Special Publications (SP) 800 series which are based on the Information Technology Laboratory's (ITL) research and guidelines.
The 800 series is designed to provide a multi-tiered approach to risk management through control compliance and security measures.
As a whole, they provide federal agencies and their supply chain with minimum acceptable information security standards for managing sensitive government data.
NIST SP 800-171 serves a diverse group in both the public and private sectors. The intended audience can be viewed from two distinct but interconnected perspectives: the Federal entity that establishes and conveys the security requirements, and the Non-Federal entity that responds to and complies with them.
These individuals are primarily focused on risk management, oversight, and acquisition, ensuring that CUI is protected throughout the supply chain:
These roles are responsible for the physical and technical implementation of the 110 security controls:
While compliance is contract-driven, certain industries are overwhelmingly the target audience due to their routine handling of CUI:
Compliance with NIST SP 800-171 is contractually driven, meaning the requirement is directly imposed by a federal agency through an agreement or legal mandate.
Generally, any federal agency that engages with third parties, and any nonfederal system or organization used by a federal agency, must comply if they process, store, or transmit Controlled Unclassified Information (CUI).
The most prominent example of this mandate is with the Department of Defense (DoD):
For organizations seeking to assess their vendor's alignment with these principles, a free NIST 800-171 questionnaire template can be a useful starting point.
While NIST SP 800-171 provides the what (the security controls), your federal contract or agreement provides the why (the mandate) and the when (the deadline).
If your organization is unsure whether a specific system or piece of information falls under the compliance umbrella, it is essential to seek clarity. The definitive source for clarification is always the Federal Contracting Officer or the responsible federal agency that issued the contract or agreement. They can confirm the exact scope of CUI involved and the specific contractual requirements your organization must meet.
You can use this free NIST 800-171 questionnaire template to assess each vendor's alignment with NIST 800-171 principles.
NIST SP 800-171 provides a standardized way to handle Controlled Unclassified Information (CUI).
The CUI Program addresses several deficiencies in managing and protecting unclassified information including inconsistent marketings, inadequate safeguarding and needless restrictions by standardizing procedures and providing common definitions through the CUI Registry.
By complying with NIST SP 800-171, you will also meet the majority of the criteria for NIST SP 800-53 and compliance with NIST SP 800-53 is a major part of FISMA and FedRAMP compliance.
It will also improve your organization's security posture and prevent data breaches by providing a secure foundation for information processing.
Additionally, complying with NIST SP 800-171 and other best practices can help your organization comply with other data protection laws and regulations including the SHIELD Act, LGPD, GDPR, CCPA, GLBA, PIPEDA, HIPAA, PCI DSS and 23 NYCRR 500.
NIST SP 800-181 outlines 14 families of security requirements for protecting the confidentiality of CUI in nonfederal systems and organizations.
Additionally, organizations can use the security controls from NIST SP 800-53 to obtain additional, non-prescriptive information related to the security requirements and supplemental guidance about how they relate to each other.
As an example, control 3.1.19 requires organizations to “Encrypt CUI on mobile devices and mobile computing platforms".
Nonfederal organizations must create a system security plan (SSP) that describes how the specified security requirements are met. The SSP should describe the system boundary, operational environment, how security requirements are implemented and the relationships with or connections to other systems.
For any unimplemented security requirements, a plan of action should be created to describe how they will be met and how any planned mitigations will be implemented.
Organizations can document the system security plan and plan of action as seperate or combined documents in any chosen format.
When requested, the system security plan and associated plan of action can be submitted to the responsible federal agency or contracting officer to demonstrate your implementation or planned implementation of the security requirements.
These documents will feed into the federal agency's overall risk management decision to process, store or transmit CUI through your system or organization.
This checklist will support your NIST 800-171 compliance efforts.
NIST SP 800-171 Revision 3 outlines 14 families of security requirements for protecting the confidentiality of CUI in nonfederal systems and organizations. These requirements are not just technical; they are categorized as operational, technical, and management safeguards. Together, they support the development of secure and resilient data processing systems.
Organizations can use the security controls from NIST SP 800-53 to obtain additional, non-prescriptive information related to the security requirements and supplemental guidance.
The access control family focuses on limiting system access to authorized users, processes, and devices. It ensures that only those with a need-to-know can reach CUI.
The awareness and training family ensures that personnel are adequately trained to carry out their security-related duties and responsibilities.
The audit and accountability family focuses on creating, protecting, and retaining system audit logs to reconstruct events, provide evidence, and ensure accountability.
The configuration management family is about establishing and maintaining baseline configurations for systems, managing changes, and monitoring configuration settings.
The identification and authentication family verifies the identity of users and devices before granting access to the system.
The incident response family establishes plans and capabilities to detect, analyze, contain, and recover from security incidents.
The maintenance family focuses on performing timely and controlled maintenance on system components and managing maintenance tools and personnel.
The media protection family protects CUI on various types of media (digital and hard copy) during handling, storage, and transport.
The personnel security family ensures personnel who access CUI are trustworthy and manages access when employment is terminated.
The physical protection family secures the physical environment of the system from unauthorized access and environmental hazards.
The risk assessment family requires organizations to periodically assess the risk to organizational operations and assets, including CUI.
The security assessment family is about monitoring, reviewing, and assessing the security controls to ensure they are implemented correctly and operating as intended.
The system and communications protection family monitors, controls, and protects organizational communications (internal and external) and secures system components.
The system and information integrity family protects against, detects, and corrects flaws, errors, and unauthorized changes to systems and information.
Read about the underlying security requirements in the NIST SP 800-171 paper here.
Controlled Unclassified Information is any information that law, regulation, or governmentwide policy requires to have safeguarding or disseminating controls, excluding information that is classified under Executive Order 13526, Classified National Security Information, December 29, 2009, or any predecessor or successor order, or the Atomic Energy Act of 1954, as amended.
The approved CUI categories are outlined in the CUI Registry.
The CUI Registry is an online repository for information, guidance, policy and requirements on handling CUI.
Additionally, the CUI Registry identifies the basis for controls, ans sets out procedures for the use of CUI, including but not limited to marking, safeguarding, transporting, disseminating, reusing and disclosing the information.
CUI is the compliance trigger for NIST SP 800-171. If a non-federal system or organization processes, stores, or transmits CUI, the requirements of the standard apply. This is why identifying and accurately marking CUI is the essential first step in the compliance journey.
The CUI Program addresses several deficiencies in managing and protecting unclassified information, including inconsistent markings, inadequate safeguarding, and needless restrictions, by standardizing procedures and providing common definitions through the CUI Registry.
The approved CUI categories are outlined in the CUI Registry. The registry details 20 categories, including:
The CUI registry is the online repository that serves as the single source of information, guidance, policy, and requirements on handling CUI. It identifies the basis for controls and outlines procedures for the use of CUI, including, but not limited to, marking, safeguarding, transporting, disseminating, reusing, and disclosing the information.
The approved CUI categories are:
Read more about the CUI categories here.
The Federal Information Security Management Act (FISMA) is a United States federal law that establishes a comprehensive framework to protect government information, operations, and assets against natural and man-made threats, including cyber attacks, data breaches, and data leaks.
FISMA requires federal government agencies, state agencies with federal programs and private-sector firms that support, sell to or receive services from the government to develop, document and implement risk-based information security policies and procedures based on the NIST 800 series.
The foundation for FISMA compliance is NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations. NIST SP 800-171's requirements are directly derived from the security controls in NIST SP 800-53, but they are tailored for a specific purpose: protecting CUI in non-federal systems.
The key distinction lies in the scope and focus of the two publications:
Since NIST SP 800-171 is a streamlined version of NIST SP 800-53, compliance with 800-171 automatically satisfies the majority of the criteria for moderate-level CUI confidentiality requirements defined under 800-53. This means an organization meeting 800-171 is well on its way to meeting a major part of overall FISMA compliance.
The Federal Risk and Authorization Management Program (FedRAMP) is designed to enable easier contracting for federal agencies with cloud service providers.
The process of FedRAMP certification requires a third-party assessment organization (3PAO) to assess security controls of the cloud service provider.
This is done through a Security Assessment Plan (SAP), performing initial and periodic assessments of security controls and producing a Security Assessment Report (SAR).
These assets are then submitted to the Joint Authorization Board or an agency to review.
If authorized, cloud service providers are awarded an Authority to Operate (ATO) and are placed on the FedRAMP marketplace for other agencies to find services that meet their needs and security requirements.
The ATO attestation is reviewed on an annual basis by the 3PAO or more frequently if there is any deviation requests or significant changes.
While FedRAMP provides assurance that the cloud service itself is secure, it does not automatically ensure an organization meets its NIST SP 800-171 obligations. The relationship is one of shared responsibility:
In short, FedRAMP is a crucial enabler, but the ultimate responsibility for overall NIST SP 800-171 compliance rests with the organization that holds the federal contract and processes the CUI.
NIST SP 800-171 is published by the National Institute of Standards and Technology (NIST), a non-regulatory agency of the Department of Commerce.
NIST was set up to encourage and assist in innovation and science through the promotion and maintenance of a set of industry standards, such as the NIST Cybersecurity Framework.
NIST SP 800-53 is one of those standards and guidelines designed to help federal agencies and contractors meet the requirements set by the Federal Information Security Management Act (FISMA). NIST's other remit to develop Federal Information Processing Standards (FIPS).
The NIST Special Publications (SP) 800 series, including 800-171 and 800-53, are based on the Information Technology Laboratory's (ITL) research and guidelines. They are designed to provide a multi-tiered approach to risk management and offer federal agencies and their supply chain with minimum acceptable information security standards for managing sensitive government data.
While NIST itself is a non-regulatory body, its publications become mandatory when referenced in:
The most recent updated was Revision 1 in December 2016. This was an errata update that included minor editorial changes, additional references and definitions, and a new appendix with expanded discussion about each CUI requirement. The largest change was a subtle name change from "Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations" to "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations," reflecting a more broad-based, holistic definition of systems that includes industrial control systems and IoT.
UpGuard helps companies secure their third-party attack surface by addressing the complete lifecycle of Vendor Risk Management, including: