What is NIST 800-171?
The National Institute of Standards and Technology (NIST) 800 is a business-oriented cybersecurity standard that provides guidelines, technical specifications, recommendations and annual reports to help keep business’s information safe.
5NINES NIST Compliance Guide
DoD Supply Chain Organizations
NIST 800 is a business-oriented cybersecurity standard that provides guidelines, technical specifications, recommendations and annual reports to help keep business’s information safe. This standard became a requirement in January 2018 for companies working with controlled unclassified information (CUI) anywhere along the Department of Defense (DoD) supply chain. DoD affiliates that fail to reach compliance risk losing their federal contracts. NIST 800-171 compliance is highly recommended for businesses unaffiliated with the DoD. Failure to meet these standards increases vulnerability to cyber-attacks, which can severely damage or even destroy a business.
NIST published a set of security requirements to protect Controlled Unclassified Information (CUI). This Special Publication 800-171 defines policies that apply to all prime and subcontractor companies conducting business with the Federal Government.
Many businesses may need to look at their supply chain to ensure compliance with NIST security standards.
Critical Transportation & Energy Sector Data
Financial Data on Accounts, Bank Transfers, and Financial Reports
Personally Identifiable Information and Regulated Data
Tax, Census, & Sensitive Population Information Data
Patient Records and Information
Law Enforcement Data: Case Files, Personal Identifying Information
Reports and Data Designated as CUI or NATO Restricted
Immigration Data: Status, Visa Status, and Asylees
Military Personnel Records
Non-DoD Supply Chain Organizations
NIST 800-171 compliance is highly recommended for businesses unaffiliated with the DoD. Failure to meet these standards increases a business’s vulnerability to cyber-attacks, which can severely damage or even destroy a business. All companies should follow this standard to keep their information safe. We can help you get there.
Comprehensive Vulnerability Assessment
Evaluate small business network scope and needs while providing accurate vulnerability assessments.
Apply lessons learned within the assessment to build a plan and develop processes to strengthen security footprint.
Execute planned initiatives, report results, and fight against complacency.
Get an IT Partner You Can Trust
316 West Washington
Madison, WI 53703