NIST SP 800-171: A set of security requirements for protecting Controlled Unclassified Information (CUI) in non-federal systems, commonly used by contractors working with the U.S. government.
Limit information system access to authorized users; processes acting on behalf of authorized users; or devices (including other information systems).
Develop; document; and periodically update access control policy and procedures.
Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
Control the flow of CUI in accordance with approved authorizations.
Control information posted or processed on publicly accessible information systems.
Authorize wireless access prior to allowing connection to the information system.
Control remote access using encrypted tunnels such as Virtual Private Networks (VPNs).
Monitor and control remote access sessions.
Employ the principle of least privilege; including for specific duties and timeframes.
Require the use of complex passwords for all privileged accounts.
Require the use of complex passwords for all non-privileged accounts.
Prohibit password reuse for a defined number of generations.
Store and transmit passwords using cryptographically sound techniques.
Limit unsuccessful logon attempts and take appropriate action.
Employ multi-factor authentication for local and network access to privileged accounts.
Employ multi-factor authentication for network access to non-privileged accounts.
Manage information system accounts; to include establishing; activating; modifying; disabling; and removing accounts.
Terminate information system access of former employees within [Assignment: organization-defined time period].
Monitor for inactivity and take action to prevent unauthorized use.
Control connection of mobile devices.
Ensure that managers; system administrators; and users of organizational information systems are made aware of the security risks associated with their activities and of the applicable policies; standards; and procedures related to the security of those systems.
Provide security awareness training to information system users (including managers; senior executives; and contractors) on recognizing and reporting potential indicators of insider threats.
Ensure that personnel receive adequate security awareness training at least annually.
Create; protect; and retain information system audit records to the extent needed to enable the monitoring; analysis; investigation; and reporting of unlawful; unauthorized; or inappropriate information system activity.
Create; protect; and retain information system audit records to the extent needed to enable the monitoring; analysis; investigation; and reporting of unlawful; unauthorized; or inappropriate information system activity.
Ensure that the actions of individual information system users can be uniquely traced to those users.
Retain audit records for [Assignment: organization-defined time period].
Provide audit record reduction and summarization tools.
Protect audit information and audit logging tools from unauthorized access; modification; and deletion.
Establish and maintain baseline configurations and inventories of organizational information systems (including hardware; software; firmware; and documentation) throughout the system development life cycle.
Establish and maintain baseline configurations and inventories of organizational information systems (including hardware; software; firmware; and documentation) throughout the system development life cycle.
Establish and enforce security configuration settings for all components of the information system consistent with applicable security policies; standards; and procedures.
Apply security configuration benchmarks to establish and maintain the security configuration of information system components.
Track; review; approve; and disapprove changes to information systems.
Analyze the security impact of changes prior to implementation.
Define; document; and enforce physical and logical access restrictions associated with changes to the information system.
Employ configuration management tools to maintain and control hardware; software; firmware; and documentation.
Monitor configuration changes to the information system on an ongoing basis.
Identify information system users; processes acting on behalf of users; or devices.
Identify information system users; processes acting on behalf of users; or devices.
Authenticate (or verify) the identities of those users; processes; or devices; as a prerequisite to allowing access to organizational information systems.
Use identifier authentication credentials that are commensurate with the risk and potential impact of unauthorized access.
Establish an operational incident-handling capability for organizational information systems that includes adequate preparation; detection; analysis; containment; recovery; and user response activities.
Establish an operational incident-handling capability for organizational information systems that includes adequate preparation; detection; analysis; containment; recovery; and user response activities.
Develop and implement an incident response plan.
Test the organizational incident response plan.
Establish; maintain; and use a process for tracking; documenting; and reporting information security incidents.
Perform maintenance on organizational information systems.
Perform maintenance on organizational information systems.
Provide trained and qualified personnel for conducting information system maintenance.
Supervise the activities of maintenance personnel.
Maintain a record of maintenance activities.
Control maintenance tools.
Check media containing diagnostic and test programs for malicious code before the media are used in the information system.
Protect information system media containing CUI at rest.
Protect information system media containing CUI at rest.
Limit access to CUI on information system media to authorized users.
Control the use of removable media on organizational information systems.
Sanitize or destroy information system media containing CUI before disposal or release for reuse.
Screen individuals prior to granting access to the information system.
Screen individuals prior to granting access to the information system.
Ensure that organizational personnel are aware of their security responsibilities.
Establish and implement procedures for the termination of individual access to the information system.
Limit physical access to the information system; equipment within the facility; and support infrastructure to authorized individuals.
Limit physical access to the information system; equipment within the facility; and support infrastructure to authorized individuals.
Establish physical security safeguards for the facility and perimeter.
Control and monitor physical access to the facility.
Maintain audit logs of physical access attempts and failures.
Control and monitor visitor access to the facility.
Protect the facility and its information systems from environmental hazards.
Provide alternate work sites to support continuation of operations in the event of a disaster or other emergency.
Periodically assess the risk to organizational operations (including mission; functions; image; or reputation); organizational assets; and individuals; resulting from the operation of organizational information systems and the associated processing; storage; or transmission of CUI.
Periodically assess the risk to organizational operations (including mission; functions; image; or reputation); organizational assets; and individuals; resulting from the operation of organizational information systems and the associated processing; storage; or transmission of CUI.
Scan for vulnerabilities in organizational information systems and applications periodically and when new vulnerabilities affecting the system are identified.
Remediate vulnerabilities in accordance with risk assessments.
Periodically assess the security controls in organizational information systems to determine if the controls are effective in their application.
Periodically assess the security controls in organizational information systems to determine if the controls are effective in their application.
Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational information systems.
Monitor security controls on an ongoing basis to ensure the continued effectiveness of the controls.
Monitor; control; and protect organizational communications (i.e.; information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information system.
Monitor; control; and protect organizational communications (i.e.; information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information system.
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
Employ cryptographic mechanisms to protect the confidentiality of CUI at rest.
Employ cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission.
Implement firewalls at organizational connections to external networks.
Implement denial of service protection.
Monitor and control organizational communications at external boundaries to prevent and detect malicious code.
Employ spam protection mechanisms at information system entry and exit points.
Update malicious code protection mechanisms when new releases are available.
Control the flow of organizational traffic into and out of the information system.
Implement a policy that restricts the use of organization-controlled portable storage devices with external information systems.
Identify; report; and correct information and information system flaws in a timely manner.
Identify; report; and correct information and information system flaws in a timely manner.
Protect against malicious code at appropriate locations within organizational information systems.
Update malicious code protection mechanisms when new releases are available.
Perform periodic scans of the information system and real-time scans of files downloaded from external sources.
Monitor organizational systems for unauthorized changes to software; firmware; and hardware.
Employ software and firmware integrity checks.