The National Institute of Standards and Technology (NIST) latest publication, NIST 800-171, focuses on protecting Controlled Unclassified Information (CUI) within nonfederal information systems and organizations.


CUI consists of any information that should not be made public but is not sensitive enough to require high-level security clearance. Some example of CUI include:

  • Personal Information- this includes things like health/military/student information, Social Security Numbers, and credit card details.
  • Financial Information- this includes information on corporate finances, taxes, purchase orders, financial transactions, electronic funds transfers, and more.
  • Intellectual Property- this includes information such as research, engineering and architectural data, project plans, technical reports, etc.…
  • IT Security: this includes anything that might compromise the integrity of information systems or the way that data is processed, stores, and transmitted.

A good rule of thumb to consider is that if a system or network device processes, stores or transmits CUI it must comply with NIST 800-171. This includes routers and switches, not just servers and desktops.

The CUI requirements are intended for use by federal agencies in appropriate contractual vehicles or other agreements established between those agencies and non-federal organizations. For more information on what constitutes CUI, check out the National Archives CUI Registry (

The deadline to meet NIST 800-171 compliance was December 31, 2017, but security professionals estimate that only one percent met that deadline. In terms of certification, there currently is none. When you sign a federally awarded contract, you are attesting to the fact that your IT systems are compliant. This means it’s up to each contractor and applicable sub-contractors to self-certify prior to signing a contract. It is NNT’s view that a well-documented System Security Plans that maps to the fourteen NIST 800-171 control families will be sufficient should questions arise around compliance.


                  NIST 800-171 Security Control Families
AC Access Control MP Media Protection
AU Audit and Accountability PP Physical Protection
AT Awareness and Training PS Personnel Security
CM Configuration Management RA Risk Assessment
IA Identification & Authentication SA Security Assessment
IR Incident Response SC System & Communications Protection
MA Maintenance SI System & Information Integrity


NNT’s Change Tracker™ product maps directly to 9 of the 14 security control families. To better understand what those controls are and where an organization might effectively start, download NNT’s 800-171 tearsheet here. Or see below for a detailed breakdown of the 800-171 control families and learn how NNT can help you address each requirement.

Requirement 3.1: Access Control

NIST 800-171

Key Security Controls Security Control Highlights Supplemental Guidance Precis How does NNT Change Tracker Gen 7™ satisfy the requirement?

3.1.1 Limit access to authorized users, processes acting on behalf of authorized users, or devices
3.1.2 Limit access to the types of transactions and functions that authorized users are permitted to execute

3.1.6 Use non-privileged accounts or roles when accessing nonsecurity functions
3.1.7 Prevent non-privileged users from executing privileged functions, audit the execution of such functions
3.1.8 Limit unsuccessful logon attempts
3.1.11 Terminate (automatically) a user session after a defined condition

Principle of Least Privilege is a fundamental Security Best Practice and the need to log all successful and unsuccessful attempts essential

AC-7 Enforces a limit of consecutive invalid logon attempts by a user during a defined time period and automatically locks the account/node for a defined time period when the maximum number of unsuccessful attempts is exceeded AC-12 This control addresses the termination of user-initiated logical sessions

Contemporary Operating System platforms provide support for detailed security policy settings covering Password and Account Lockout Policies but these must all be set correctly and enforced. NNT is a Certified CIS Vendor and as such, accurately delivers the industry-standard configuration hardening guidance form the CIS Benchmarks. This means you are assured of always having the latest expert configuration settings to minimize your organizations attack surface.

Requirement 3.3: Audit and Accountability

NIST 800-171

Key Security Controls Security Control Highlights Supplemental Guidance Precis How does NNT Change Tracker Gen 7™ satisfy the requirement?


3.3.1 Create, protect, and retain information system audit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity.

Audit events can include, for example, password changes, failed logons, or failed accesses related to information systems, administrative privilege usage, PIV credential usage, or third-party credential usage

Configuration of a comprehensive audit policy is key - get it right and you will capture a forensic audit-trail of user activities suitable for pre-empting an attack and for reconstructive forensic analysis post-breach. Get it wrong and you will miss crucial events and likely be swamped with spurious log data. NNT provide Configuration Remediation Kits to automatically set a NIST Auditor-class audit policy on all platforms, backed with Certified CIS reports to continuously validate and enforce adherence. Note: NNT Log Tracker™ can also be employed to analyze and backup logs.

Requirement 3.4: Configuration Management

NIST 800-171

Key Security Controls Security Control Highlights Supplemental Guidance Precis How does NNT Change Tracker Gen 7™ satisfy the requirement?


"3.4.1 Establish and maintain baseline configurations of organizational information systems (including hardware, software, firmware, and documentation) 
3.4.2 Establish and enforce security configuration settings for information technology products "

Baseline configurations serve as a basis for future builds, releases, and changes to information systems. Baseline configurations include information about information system components (e.g., software packages installed; current version numbers/patch information on operating systems/applications & configuration settings/parameters). Maintaining baseline configurations requires creating new baselines as organizational information systems change over time.

"As well as the pre-built NIST compliance reports, any device being monitored can have its configured state captured as a dynamically-generated Baseline Report, providing a Point-in-Time record to compare with other devices or future points in time.

For Change Control, Change Tracker™ utilizes a unique control systems known as 'Closed Loop Intelligent Change Control', literally learning which changes within your environment are normal, applying threat-based logic to the automation of change approvals."

Requirement 3.6: Incident Response

NIST 800-171

Key Security Controls Security Control Highlights Supplemental Guidance Precis How does NNT Change Tracker Gen 7™ satisfy the requirement?


3.6.1 Establish an operational incident-handling capability for organizational information systems

The organization employs automated mechanisms to support the incident handling process. The organization correlates incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response.

"Change Tracker™ cuts out the 'alert fatigue' and 'change noise' associated with traditional integrity monitoring systems like Tripwire®. By leveraging NNT FAST™ (File Approved-Safe technology) Cloud, file changes are automatically validated using an authoritative file whitelist. This radically reduces the incident response process by highlighting only genuinely suspicious activities.

In addition, because Change Tracker™ identifies Who Made the Change, investigation tasks are greatly simplified."

Requirement 3.7: Maintenance

NIST 800-171

Key Security Controls Security Control Highlights Supplemental Guidance Precis How does NNT Change Tracker Gen 7™ satisfy the requirement?


3.7.1 Perform maintenance on organizational information systems
3.7.2 Provide effective controls on the tools, techniques, mechanisms, and personnel used to conduct information system maintenance

The organization: (a) Employs automated mechanisms to schedule, conduct, and document maintenance and repairs; and (b) Produces up-to date, accurate, and complete records of all maintenance and repair actions requested, scheduled, in process, and completed.

"All changes are captured and presented clearly for review and approval.

Change Tracker™ integrates with change management systems such as ServiceNow® to automate the flow of approved planned changes, reconciling what actually changed with the expected approved-change profile"

Requirement 3.8: Media Protection

NIST 800-171

Key Security Controls Security Control Highlights Supplemental Guidance Precis How does NNT Change Tracker Gen 7™ satisfy the requirement?


3.8.1 Protect information system media containing CUI, both paper and digital
3.8.2 Limit access to CUI on information system media to authorized users
3.8.3 Sanitize or destroy information system media containing CUI before disposal/reuse

"Information system media includes digital media. Restricting access to digital media includes limiting access to design specifications stored on compact disks in the media library to the project leader and the individuals on the development team.

Cryptographic mechanisms can provide confidentiality and integrity protections depending upon the mechanisms used."

User-permissions and network segregation all rely on secure configuration settings and tightly governed change control. Change Tracker™ NIST Compliance Reports will show if user rights are incorrectly set and any configuration 'drift' will be clearly exposed to allow review and remediation. Encryption services and settings, such as MS BitLocker, can similarly be automatically reviewed and benchmarked for security.

Requirement 3.11: Risk Assessment

NIST 800-171

Key Security Controls Security Control Highlights Supplemental Guidance Precis How does NNT Change Tracker Gen 7™ satisfy the requirement?


3.11.1 Periodically assess the risk to organizational operations, organizational assets, and individuals, resulting from the operation of organizational information systems and the associated processing, storage, or transmission of CUI

Vulnerability scanning includes, scanning for patch levels, scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and scanning for improperly configured or incorrectly operating information flow control mechanisms.

NNT provide regularly updated CIS-based NIST compliance reports to identify vulnerabilities on a huge range of platforms, applications and network appliances. Open ports can be tracked using both external and internal scans, and using the Baseline Report, a clear hardened-build state recorded for any device/device type. Change Tracker™ provides continuous configuration monitoring and any drift from the organizational build-standard will be clearly highlighted. Similarly, installed software and updates can be baselined, including the installed version.

Requirement 3.13: System and Communications Protection

NIST 800-171

Key Security Controls Security Control Highlights Supplemental Guidance Precis How does NNT Change Tracker Gen 7™ satisfy the requirement?


3.13.1 Monitor, control, and protect organizational communications at the external boundaries and key internal boundaries of the information systems

"Restricting interfaces within organizational information systems includes, restricting external web traffic to designated web servers within managed interfaces and prohibiting external traffic that appears to be spoofing internal addresses.

Cryptographic mechanisms implemented to protect information integrity include cryptographic hash functions."

"Managing firewall rules and settings is an essential task in order to safeguard boundary protection - Change Tracker™ will provide visibility of any changes made, with a complete step-by-step audit trail of interim changes. At each stage a full baseline of settings is also retained for review and different devices and/or points in time can be compared to the Gold Build Standard.

For end-points, session security, authenticity and disconnect settings can be expertly assessed against industry-best practice using CIS Secure Configuration Guidance, and any shortcomings will be highlighted for remediation."

Requirement 3.14: System and Information Security

NIST 800-171

Key Security Controls Security Control Highlights Supplemental Guidance Precis How does NNT Change Tracker Gen 7™ satisfy the requirement?


3.14.1 Identify, report, and correct information and information system flaws
3.14.2 Provide protection from malicious code at appropriate locations within organizational information systems
3.14.3 Monitor information system security alerts and advisories

Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity. Software includes operating systems, including kernels and drivers, middleware, and applications. Firmware includes the BIOS. Information includes metadata such as security attributes associated with information. State-of-the-practice integrity-checking mechanisms e.g. cryptographic hashes and associated tools can automatically monitor the integrity of information systems and applications.

"Change Tracker™ provides instant, real-time detection of file integrity changes, using SHA-2 or higher hash validation, for all system files and configuration settings, for all devices and platforms

Working in conjunction with NNT FAST™ Cloud, as changes are detected, files can be assessed against a 'known good' whitelist of proven-safe files in order to reduce change noise and more clearly expose zero day malware that would otherwise evade traditional anti-virus technology."




NNT Products
USA Offices
New Net Technologies LLC
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
email [email protected]
UK Office
New Net Technologies LLC
Rivers Lodge
West Common

Tel: 01582 287310
email [email protected]
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
CIS benchmarking SEWP Cybersecurity 500 Sans Institute
Copyright 2018, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.