Skip to content

What is the difference between NIST 800-171 and NIST 800 172?


What are NIST 800-171 and NIST 800-172?

NIST 800-171 and NIST 800-172 are two sets of cybersecurity standards developed by the National Institute of Standards and Technology (NIST) to enhance the security practices of federal agencies and government contractors. These standards provide a comprehensive framework for protecting Controlled Unclassified Information (CUI) and enhancing overall cybersecurity posture. While both NIST 800-171 and NIST 800-172 share the goal of safeguarding sensitive information and critical systems, they differ in terms of scope and requirements. Understanding the distinctions between these two standards is essential for organizations seeking to comply with federal cybersecurity regulations.

NIST 800-171:

NIST 800-171, also known as "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations," focuses on the protection of CUI that is processed, stored, or transmitted by non-federal agencies or organizations. It contains 14 control families and outlines specific security requirements that ensure adequate protection of CUI. NIST 800-171 is primarily relevant to government contractors and non-federal agencies that handle CUI as part of their work or in support of federal contracts. Compliance with these standards is a contractual obligation for organizations working with federal agencies, providing a strong layer of security for sensitive information and systems.

NIST 800-172:

NIST 800-172, also known as "Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171," builds upon NIST 800-171 and introduces additional controls designed to combat persistent and advanced cyber threats. It establishes a higher level of security for organizations that handle CUI critical to the operation of covered defense information systems. NIST 800-172 is specifically aimed at defense contractors and emphasizes the implementation of more stringent security requirements to protect critical programs, high-value assets, and sensitive information from sophisticated and targeted attacks. Compliance with NIST 800-172 is necessary for defense contractors to secure federal contracts and contribute to national security efforts.

Difference between NIST 800-171 and NIST 800-172

NIST 800-171 and NIST 800-172 are two sets of cybersecurity standards developed by the National Institute of Standards and Technology (NIST) to enhance the security practices of federal agencies and government contractors. Both standards focus on protecting controlled unclassified information (CUI), but they differ in their scope and requirements.

NIST 800-171, also known as "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations," provides guidelines for entities that process CUI, including government contractors and non-federal agencies. It consists of 14 control families and outlines specific security requirements to ensure the protection of CUI. Compliance with NIST 800-171 is a contractual obligation for organizations working with federal agencies, providing a baseline level of security for sensitive information.

NIST 800-172, on the other hand, emphasizes higher levels of security for information that must not be compromised. Although it is still in draft version, NIST 800-172 focuses on enhanced security requirements aimed at protecting high-value assets and critical programs. It aims to address persistent threats and provide a penetration-resistant architecture for critical systems.

Important revisions have been made to NIST 800-171, including Revision 1, Revision 2, and Revision B. These revisions introduced additional controls and enhanced the security requirements. NIST 800-172 builds upon these revisions and introduces more stringent requirements for federal contractors and non-federal agencies.

Overview of NIST 800-171 requirements

NIST 800-171, also known as "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations," sets forth specific security requirements for entities that process CUI, including government contractors and non-federal agencies. It consists of 14 control families that address various aspects of information security, such as access controls, risk assessment, and continuous monitoring. Compliance with NIST 800-171 is a contractual obligation for organizations working with federal agencies, ensuring the protection of sensitive information and providing a baseline level of security. The standard has undergone important revisions to strengthen security measures, including the introduction of additional controls and enhanced requirements. These updates ensure that organizations maintain an adequate security posture and are prepared to defend against cyber threats. By adhering to NIST 800-171 requirements, entities can enhance their security practices, meet government policy mandates, and protect valuable information from unauthorized access or disclosure.

Access control

Access control is a critical component of the security requirements outlined in both NIST 800-171 and NIST 800-172. These guidelines provide federal agencies, government contractors, and non-federal systems with the necessary framework to protect controlled unclassified information (CUI) and covered defense information (CDI) from unauthorized access.

Access control limits system access to authorized users and processes, thereby reducing the risk of data breaches and cyber threats. It ensures that only individuals with the appropriate credentials and permissions can gain entry to sensitive information. This layer of security helps maintain the integrity, confidentiality, and availability of CUI and CDI.

Key components of access control include user authentication, session lock, least privilege, and account monitoring. User authentication verifies the identity of individuals accessing the system, typically through usernames and passwords. Session lock limits access to authorized users during periods of inactivity, preventing unauthorized access if a user steps away from their workstation. Least privilege aims to grant users the minimum level of access required to fulfill their job responsibilities. Account monitoring involves the continuous monitoring and analysis of user account activity for suspicious behavior or unauthorized access attempts.

By following these access control requirements outlined in NIST 800-171 and NIST 800-172, organizations can enhance their security posture, protect critical programs and high-value assets, and comply with relevant security controls and government policies related to access control.

Awareness and training

Awareness and Training is a requirement family within the NIST 800-171 standard that focuses on the importance of educating and training personnel to enhance their understanding of security practices and procedures. This requirement family recognizes that personnel play a critical role in maintaining the security posture of an organization.

To meet this requirement, federal agencies and government contractors must establish a comprehensive security training program. This program should include both role-based and general security training, tailored to the specific needs and responsibilities of personnel. It is important to note that appropriate documentation of training activities is also required.

NIST 800-171 provides guidance on the topics that formal training for personnel should cover. These topics include information handling procedures, system security components and protocols, encryption and data protection, incident response procedures, and the identification of potential security threats and risks. Additionally, it is crucial to educate personnel on the proper handling of Controlled Unclassified Information (CUI) and the potential consequences of non-compliance with security policies.

By implementing an effective awareness and training program, organizations can ensure that their personnel are equipped with the knowledge to identify and mitigate security risks. This helps to strengthen the overall security posture and protect against potential cyber threats and attacks.

Auditing and accountability

Auditing and accountability play a crucial role in ensuring the traceability of individuals and actions within a system, as well as monitoring potential security breaches. These practices provide a layer of security and assist in maintaining the integrity and confidentiality of information.

Event logging is a key requirement for auditing and accountability. It involves the recording of significant events or activities within a system or network. These events can include user access and authentication, changes to system configurations, and any suspicious behavior that may indicate a potential security breach. By capturing and analyzing these logs, organizations can identify any unauthorized access or malicious activity, allowing them to take swift and appropriate action.

Monitoring is another essential aspect of auditing and accountability. It involves the continuous observation of system activities to detect and respond to security incidents. Through monitoring, organizations can identify patterns, anomalies, and potential threats in real-time, allowing for a quick response to mitigate risks and protect critical programs and high-value assets.

To meet auditing and accountability requirements, organizations must adhere to specific practices, such as log analysis and audit retention. Log analysis involves reviewing and analyzing event logs to identify trends, patterns, and potential security issues. This analysis enables organizations to proactively address vulnerabilities and enhance their security posture.

Audit retention refers to the storage and retention of audit logs for a specified period. This allows for the examination of historical data and the investigation of any past security incidents or breaches. Retaining audit logs for an appropriate duration ensures that organizations can demonstrate compliance with security standards, government policies, and contractual obligations.

Configuration management

Configuration management is an essential component of both NIST 800-171 and NIST 800-172. It involves implementing controls to manage the baseline configurations of IT systems, including hardware, firmware, software, and documentation. By standardizing and controlling these configurations, organizations can ensure the integrity, availability, and confidentiality of their information systems.

Standardizing configurations is crucial because it helps establish a consistent and secure environment across IT systems. This reduces potential vulnerabilities and minimizes the risk of unauthorized access or malicious activities. Additionally, standardized configurations simplify the management and maintenance of IT systems, as any changes or updates can be applied consistently throughout the organization.

In NIST 800-171, there are specific controls related to configuration management. These include the establishment and maintenance of baseline configurations, the management of changes to information system components, the development of inventories of information system components, and the conduct of security impact analyses. These controls are designed to ensure that IT systems are properly configured, vulnerabilities are identified and addressed, and changes are implemented in a secure manner.

NIST 800-172, on the other hand, focuses on enhanced configuration management controls for the protection of controlled unclassified information (CUI) in non-federal systems and organizations. It builds upon the requirements in NIST 800-171 and introduces additional controls to mitigate persistent threats and enhance security measures for CUI.

Identification and authentication

In NIST 800-171, the requirements and controls related to identification and authentication play a crucial role in ensuring the security of Controlled Unclassified Information (CUI) and preventing unauthorized access.

The standard emphasizes the implementation of strong authentication measures to verify the identity of users accessing CUI. This includes the use of unique user accounts and the enforcement of complex password policies to prevent easy unauthorized access.

Furthermore, NIST 800-171 requires multi-factor authentication. This adds an extra layer of security by requiring users to provide two or more types of authentication factors, such as passwords, smart cards, or biometrics. This reduces the risk of unauthorized access even if one factor is compromised.

To ensure that only confirmed and approved users can access CUI, the standard mandates that access be granted based on the principle of least privilege. This means that users are only given the minimum level of access necessary to perform their authorized tasks.

In terms of resisting unauthorized remote access, NIST 800-171 emphasizes the use of secure network connections, such as virtual private networks (VPNs) or encrypted connections. These measures help protect against potential threats when accessing CUI remotely.

By implementing these identification and authentication controls, NIST 800-171 helps ensure that only authorized users can access CUI, and it strengthens the resistance against unauthorized remote access.

Incident response

Both NIST 800-171 and NIST 800-172 place a strong emphasis on incident response requirements to ensure the protection of Controlled Unclassified Information (CUI) and other sensitive data.

Under NIST 800-171, organizations are required to establish and practice a formal incident response plan (IRP) that outlines procedures for detecting, containing, eradicating, and recovering from security incidents. This plan should include clear guidelines for identifying and reporting incidents, as well as designated individuals responsible for coordinating the response efforts.

Similarly, NIST 800-172 addresses incident response requirements for safeguarding Controlled Defense Information (CDI) and Covered Defense Information (CDI) within the Defense Industrial Base (DIB). Organizations must develop incident response capabilities that align with the guidance provided in the NIST Computer Security Incident Handling Guide (SP 800-61).

Both standards stress the importance of promptly detecting and reporting security incidents. Organizations must implement monitoring mechanisms to detect potential security breaches and initiate an appropriate response. Incident containment measures should be implemented to prevent further damage and limit the exposure of sensitive data. Following containment, organizations must eradicate the root causes of the incident and recover affected systems and data to a secure state.

To ensure the effectiveness of incident response plans, regular testing and training exercises are required. Organizations must regularly evaluate their response capabilities through simulated incident scenarios and update their plans accordingly. By doing so, organizations can strengthen their security posture and mitigate the potential risks associated with cyber threats.

Maintenance

Maintenance is a crucial aspect of ensuring the security and integrity of system components as outlined in the NIST 800-171 standard. This standard requires organizations to establish and adhere to specific maintenance requirements to enhance their overall security posture.

Regularly maintaining system components is of utmost importance to bolster security. By keeping software, hardware, and firmware up to date, organizations can mitigate vulnerabilities which could potentially be exploited by malicious actors. This proactive approach is key in preventing unauthorized access and mitigating risks posed by persistent threats.

NIST 800-171 specifies various controls related to maintenance. One such control is patch management, which requires organizations to promptly install updates and patches released by software vendors. This helps address known security vulnerabilities and weaknesses in the system.

Additionally, the standard highlights the importance of maintaining comprehensive software and hardware inventories. This control ensures that organizations have an accurate understanding of their system's components, making it easier to identify and mitigate potential risks.

Implementing robust antivirus protection is another control emphasized by NIST 800-171. Regular updates and scans help detect and mitigate the presence of malware or other malicious software that could compromise system security.

Media protection

In the realm of cybersecurity, media protection plays a crucial role in safeguarding physical and digital media assets. NIST 800-171 provides guidelines and controls to ensure the integrity, confidentiality, and availability of media throughout its life cycle.

The policies and controls within the Media Protection family encompass various aspects, starting with the proper handling and storage of physical media. This involves securely storing and restricting access to physical media such as hard drives, CDs, and USB drives. Labeling requirements are also emphasized to accurately identify and track media, ensuring its traceability and appropriate handling.

For digital media, NIST 800-171 emphasizes the use of encryption to protect sensitive information stored on media devices. The standard also stresses the importance of securely erasing or sanitizing media before its disposal or reuse. This process ensures that any residual data on the media is effectively removed, preventing unauthorized access or data breaches.

Tracking and accountability are significant aspects of media protection. Organizations are required to maintain logs or records that document the movement and use of media within their environment. This serves as an audit trail, facilitating the identification of any unauthorized activities or potential security incidents.

By adhering to these policies and controls, organizations can ensure the protection of both physical and digital media assets, mitigating the risk of data loss, theft, or unauthorized access.

Physical protection

Physical protection is a crucial component of the NIST 800-171 standards and plays a key role in safeguarding Controlled Unclassified Information (CUI). The requirements and strategies related to physical protection ensure the security of the physical environment where CUI is housed.

One of the main objectives of physical protection is to establish a secure physical environment. This involves implementing measures to prevent unauthorized access to areas where CUI is stored or processed. Access control mechanisms, such as locks, keycards, biometric systems, and security guards, are key components to restrict entry to authorized personnel only.

Additionally, alternate site security is an important aspect of physical protection. It involves having backup locations or facilities that can be used to continue critical operations in case of emergencies or disruptions. These alternate sites should possess adequate security measures to protect the physical environment and ensure the safety of CUI.

Environmental protection is another key component addressed by the Physical Protection family of NIST 800-171. It focuses on safeguarding the physical infrastructure and equipment that house CUI from potential threats or hazards. This includes measures such as fire suppression systems, temperature and humidity controls, and protection against natural disasters.

By incorporating robust access control, alternate site security, and environmental protection measures, NIST 800-171 ensures that organizations maintain a secure physical environment for the protection of CUI. These requirements contribute to the overall security posture of federal agencies, government contractors, and other organizations handling sensitive information.

Risk assessment

Risk assessment is a critical component of both NIST 800-171 and NIST 800-172 frameworks, playing a crucial role in ensuring the security and protection of controlled unclassified information (CUI). These frameworks aim to enhance the security posture of federal contractors and agencies by establishing stringent requirements and relevant security controls.

Conducting thorough risk assessments is imperative to identify potential vulnerabilities and risks within an organization's information systems and infrastructure. This process involves evaluating the likelihood and impact of security breaches or unauthorized access to CUI. By systematically assessing risks, organizations can prioritize and implement appropriate security measures to mitigate these risks effectively.

Vulnerability scanning is an essential tool used during the risk assessment process. It helps identify weaknesses in an organization's systems, networks, and applications that could be exploited by malicious actors. By conducting regular vulnerability scans, organizations can proactively address and remediate any weaknesses, thereby reducing the risk of cyber threats.

Organizations must have well-defined risk assessment policies that outline the procedures, responsibilities, and methodologies for conducting risk assessments. These policies should address the frequency and scope of assessments, as well as documentation and reporting requirements.

Events such as security breaches, technological advancements, regulation changes, or new threats can prompt updates to risk assessment procedures. Organizations must continually evaluate and update their risk assessments to adapt to evolving security landscapes and ensure the continued effectiveness of their security controls.

System and communications protection

System and Communications Protection is a critical family of requirements outlined in NIST 800-171. These requirements focus on safeguarding the communications channels and systems within an organization to protect the confidentiality, integrity, and availability of sensitive information.

Encryption plays a vital role in System and Communications Protection. NIST 800-171 requires organizations to use encryption mechanisms to protect the confidentiality of information transmitted over external networks. This ensures that data remains secure even if intercepted by unauthorized individuals.

Firewalls are another essential component of System and Communications Protection. Organizations must implement firewalls to manage and control network traffic, preventing unauthorized access to sensitive information. Firewalls act as a barrier between internal systems and external networks, allowing only authorized communication and preventing malicious attacks.

Demilitarized zones (DMZ) are also necessary for effective System and Communications Protection. DMZs are network segments that separate external-facing systems from internal networks. By isolating and segregating external-facing systems, organizations can minimize the risk of unauthorized access and protect critical infrastructure.

Network device hardening is a crucial control within System and Communications Protection. It involves securely configuring network devices such as routers, switches, and access points to eliminate vulnerabilities and reduce the risk of exploitation. By implementing standardized and secure configurations, organizations can enhance the overall security posture of their network infrastructure.

NIST 800-171 provides detailed requirements and controls for System and Communications Protection. By adhering to these guidelines, organizations can establish a robust layer of security to protect their communications channels and systems from various threats.

Overview of NIST 800-172 requirements

NIST 800-172, also known as Protecting Controlled Unclassified Information (CUI) in Non-federal Systems and Organizations, establishes enhanced security requirements for protecting CUI on non-federal systems. Unlike NIST 800-171, which focuses on protecting CUI on federal contractor systems, NIST 800-172 extends the scope to include non-federal systems that handle CUI.

To meet the requirements of NIST 800-172, organizations must implement several enhanced security measures. These measures aim to safeguard CUI from unauthorized access and ensure its confidentiality, integrity, and availability.

One of the key differences between NIST 800-171 and NIST 800-172 is the inclusion of additional controls in the latter. NIST 800-172 introduces 33 new enhanced controls that organizations must implement to protect CUI on non-federal systems. These controls cover areas such as access control, system and communications protection, incident response, and system and information integrity.

Furthermore, NIST 800-172 emphasizes the importance of continuous monitoring and regular security assessments to ensure the effectiveness of implemented security controls. Organizations are required to conduct security assessments to identify vulnerabilities and assess the overall security posture of their systems.

General thought leadership and news

In sync for success: the power of partnership alignment

In sync for success: the power of partnership alignment

Last month, I found myself in an engaging conversation with a partner from one of the Big 4 firms, where a thought-provoking question was raised...

The Three Lines and how 6clicks can help

The Three Lines and how 6clicks can help

Effective risk management involves not only implementing security measures but also establishing governance processes that form a unified structure...

ISO 27001: Why do we need an ISMS?

ISO 27001: Why do we need an ISMS?

An Information Security Management System (ISMS) is designed to safeguard sensitive data and help organizations reduce risks and minimize the impact...

Breaking down an ISO 27001 policy

Breaking down an ISO 27001 policy

An information security policy is a requirement in the ISO 27001 standard that aims to demonstrate the commitment of an organization’s executive...

Demystifying the NIST Cybersecurity Framework

Demystifying the NIST Cybersecurity Framework

Unlock the secrets of the NIST Cybersecurity Framework with this comprehensive guide that breaks down its key components and implementation...

ISO 27001 vs NIST CSF compliance: What's the difference?

ISO 27001 vs NIST CSF compliance: What's the difference?

ISO 27001 and NIST CSF both provide organizations with a robust framework for establishing cybersecurity, information security, and data privacy...