NIST 800-171 and CMMC
Do you have contracts with the United States Department of Defense (DoD) or are you a subcontractor to a prime contractor with DoD contracts? If so…are you prepared for NIST 800-171 requirements? Do you understand about Cybersecurity Maturity Model Certification (CMMC)?
The NIST 800-171 publication outlines “basic” security standards and controls designed to provide guidance for the protection and safeguarding of Controlled Unclassified Information (CUI) by federal contractors and subcontractors who process, store, or transmit information as part of their “routine” business operations.
NIST 800-171 is a framework designed to provide guidance to anyone that handles Controlled Unclassified Information (CUI):
- When the CUI is resident in nonfederal information systems and organizations
- When the information systems where the CUI resides are not used or operated by contractors of federal agencies or other organizations on behalf of those agencies;
- Where there are no specific safeguarding requirements for protecting the confidentiality of CUI prescribed by the authorizing law, regulation, or government-wide policy for the CUI category or subcategory listed in the CUI Registry.
Currently, there is no certification process for 800-171. By implementing the recommended 800-171 security controls, organizations essentially are self-attesting they meet and comply with the stipulated requirements. You can download the NIST 800-171 Self-Assessment Methodology here.
CMMC auditing and is conducted by accredited 3PAO (Third-Party Assessment Organizations).
The deadline to comply with 800-171 requirements was December 31st, 2017 and it is currently estimated that less than 1% have met those requirements. While the impact for non-compliance may not be apparent or obvious at this moment, it is only a matter of time before 800-171 obligations are strictly enforced. The impact of non-compliance could potentially result in contract termination, criminal fraud and possibly lawsuits claiming breach of contract.
As a response to the initially low take-up of NIST 800-171, the CMMC has now been introduced to provide a graded, and therefore easier, adoption of security controls.
CMMC breaks the NIST 800-171 controls into five sub-groups and these provide a prioritized series of incrementally greater numbers of controls required at each Level of cybersecurity ‘maturity’. For example, CMMC Level 1 only mandates 17 controls out of the total of 171, prioritizing the essential security controls of Access Control and firewalling, Physical and Logical Protection/segmentation of data and systems, and Vulnerability Management, Patching and Malware defenses. Each subsequent Level of CMMC progressively builds on the previous Level’s controls.
The security requirements outlined in 800-171 should be complementary to an organization's existing IT strategy. 800-171 is very descriptive and requires the understanding of 171 controls across 14 categories which helps define “what” needs to be accomplished. However, it lacks any prescriptive detail of “how” to accomplish compliance success and what should be the priority of those requirements.
Let NNT show you how a single solution addresses one-third of all the security and compliance requirements across the various 14 categories.
Speak to a consultant to help you in your NIST 800-171 compliance program today! Contact Us
Learn about each requirement and how NNT can help you achieve NIST 800-171 compliance
- US Defense Contractor Taken Down by Ransomware
- U.S. Government Payment Provider Exposes 14M Records
- DoD Issues New Guidance to Drive NIST 800-171 Compliance
- Danish Railway Company Suffers DDoS Attack
- All NIST 800-171 Blog Posts
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.