
In 2021, the average data breach cost $1.93 million, a staggering 79% increase from 2021. Though breaches impacting governmental agencies don’t always rack up these same costs, they’re still expensive to mitigate, reputationally damaging and could even threaten national security. That’s where NIST 800-171 comes in and tools like an NIST 800-171 checklist can help.
The National Institute of Standards and Technology (NIST) is a U.S. federal agency responsible for managing how third parties, partners and contractors handle government information. More specifically, the NIST 800-171 is a guiding document that tells defense contractors and subcontractors how to manage controlled, unclassified information (CUI), including personal data, logistics plans and any other confidential, defense-related intel.
Our NIST 800-171 checklist aids organizations in identifying security requirements, determining what controls exist and understanding how they can help protect defense information through an effective compliance program.
Here’s everything governmental agencies and their partners need to know to get started.
NIST 800-171 is a document that, along with NIST 800-53, tells contractors, subcontractors and other non-federal organizations how to store and handle CUI. While NIST is a non-regulatory agency, any organization that processes, stores or transmits CUI must be NIST 800-171 compliant. NIST 800-171 also applies to any organizations that are federal contractors or who partner with federal contractors.
NIST 800-171 reaches back to 2010 when President Obama signed Executive Order 13556. This order mandated that all government agencies better protect CUI to fight back against several federal-level breaches around that time. The executive order called for a more unified cybersecurity policy for all governmental agencies and their partners.
Governments handle countless different types of information, from personal contact and account information to plans for operations in foreign countries. At its core, the purpose of NIST 800-171 is to standardize how all federal agencies and their partners define CUI and then outline standards these organizations should follow when processing, storing or handling CUI.
Compliance with this standards requires that organizations meet a minimum standard for specific cybersecurity and privacy controls. Some federal contracts might stipulate additional cybersecurity requirements, but even in their absence, organizations must always meet or exceed the requirements of NIST 800-171.
NIST 800-171 contains 14 requirements for processing, storing and handling CUI. The requirements range from controlling which users can access which data to the integrity of the information system to the training users receive, all of which are intended to standardize how government agencies handle sensitive information.
The following is the NIST 800-171 controls list and requirements:
NIST 800-171 has 110 controls organized across 14 control families, which we detailed in the above NIST 800-171 Requirements section. These 110 controls are then mapped to different standards and policies, all of which organizations must follow to be compliant.
With 14 control families, 110 controls and more than 300 control objectives, implementing this rigorous standard can seem daunting. Though it can help to either use governance and compliance technology or consult a professional, a good NIST 800-171 checklist can help distill the 72-page guidelines into actionable steps that will help any organization get on track.
To implement NIST 800-171, organizations should:
Complying with NIST 800-171 may be a legal requirement, but, in practice, it’s so much more than another compliance box to check. NIST 800-171 applies to all organizations that work with the federal government, meaning that secure data practices enable the federal government to do valuable work. What’s more, CUI is attached to actual people, meaning that compliance also protects the individuals whose data the organization is handling.
Because this data has value, compliance protects the organization financially and reputationally. IBM reported that the average cost of a breach was $1.93 million in 2021, which can significantly impact the company’s bottom line. Should their reputation take a hit, the organization can lose a lot more profit in the long run since the organization may appear less trustworthy in the eyes of the public and in the eyes of potential partners.
The government can also take action against organizations failing to meet NIST 800-171. Penalties include:
Building an internal culture of compliance can be challenging. But collaborating with third parties can further complicate compliance activities, especially since contractors might be in a different location from the organization or have their own standards for information security.
While our NIST 800-171 checklist can help get you started, Third-Party Compliance from Diligent provides a more robust risk assessment, making compliance even easier. Diligent’s thorough assessment process for all contractors allows organizations to stay ahead of potential ethical and compliance risks, making it even easier to facilitate secure and successful third-party partnerships.