NIST 800-171

What is NIST 800-171?

The National Institute of Standards and Technology (NIST) 800 is a business-oriented cybersecurity standard that provides guidelines, technical specifications, recommendations and annual reports to help keep business’s information safe.

DoD Supply Chain Organizations

NIST 800 is a business-oriented cybersecurity standard that provides guidelines, technical specifications, recommendations and annual reports to help keep business’s information safe. This standard became a requirement in January 2018 for companies working with controlled unclassified information (CUI) anywhere along the Department of Defense (DoD) supply chain. DoD affiliates that fail to reach compliance risk losing their federal contracts. NIST 800-171 compliance is highly recommended for businesses unaffiliated with the DoD. Failure to meet these standards increases vulnerability to cyber-attacks, which can severely damage or even destroy a business.

NIST published a set of security requirements to protect Controlled Unclassified Information (CUI). This Special Publication 800-171 defines policies that apply to all prime and subcontractor companies conducting business with the Federal Government.

Many businesses may need to look at their supply chain to ensure compliance with NIST security standards.

Critical Transportation & Energy Sector Data

Financial Data on Accounts, Bank Transfers, and Financial Reports

Personally Identifiable Information and Regulated Data

Tax, Census, & Sensitive Population Information Data

Patient Records and Information

Law Enforcement Data: Case Files, Personal Identifying Information

Reports and Data Designated as CUI or NATO Restricted

Immigration Data: Status, Visa Status, and Asylees

Military Personnel Records

Non-DoD Supply Chain Organizations

NIST 800-171 compliance is highly recommended for businesses unaffiliated with the DoD. Failure to meet these standards increases a business’s vulnerability to cyber-attacks, which can severely damage or even destroy a business. All companies should follow this standard to keep their information safe. We can help you get there.

 

l

1. Assess

 

Comprehensive Vulnerability Assessment

Evaluate small business network scope and needs while providing accurate vulnerability assessments.

~

2. Protect

 

Mitigation

Apply lessons learned within the assessment to build a plan and develop processes to strengthen security footprint.

3. Manage

 

Managed Services

Execute planned initiatives, report results, and fight against complacency.

Get an IT Partner You Can Trust

EMAIL
inquiry@5nines.com

PHONE
608.512.1000

ADDRESS
316 West Washington
Suite 600
Madison, WI 53703

Security Partners

Verified By: