The document outlines the requirements for compliance with NIST Special Publication 800-171, which addresses the protection of Controlled Unclassified Information (CUI) by organizations that deal with governmental information. It details the importance of NIST, defines CUI, and specifies the necessary security controls and processes required for compliance. Additionally, it explains how entities can determine their compliance status through external assessments and the supported services offered by Corserva for achieving compliance.
2
3
4
5
What is NIST?
WhatAre the Requirements?Agenda
1
Do I Need to Comply?
How Can I Determine If I Am Compliant?
Corserva’s NIST Assessments
3.
What is NIST?
•NIST (National Institute of Standards and Technology) is part of the
U.S. Department of Commerce.
• The National Institute of Standards and Technology (NIST) was
founded in 1901, and is one of the nation's oldest physical science
laboratories.
• Congress established the agency to remove a major challenge to
U.S. industrial competitiveness at the time—a second-rate
measurement infrastructure that lagged behind the capabilities of
the United Kingdom, Germany, and other economic rivals.
• The Information Technology Laboratory (ITL) at the National
Institute of Standards and Technology (NIST) promotes the U.S.
economy and public welfare by providing technical leadership for
the nation’s measurement and standards infrastructure.
NIST Defined
4.
What is NISTSP800-171?
• NIST Special Publication 800-171 (originally created in June 2015
and updated in December 2016) specifically covers the protection
of “Controlled Unclassified Information” (CUI).
• The requirements recommended for use in this publication are
derived from FIPS Publication 200 and the moderate security
control baseline in NIST Special Publication 800-53.
• NIST Special Publication 800-53 covers security controls for US
federal information systems except those related to national
security.
• The requirements and security controls have been determined over
time to provide the necessary protection for federal information and
systems which are covered under FISMA (Federal Information
Security Modernization Act of 2014).
NIST SP800-171 r1
5.
What is CUI?
•Controlled Unclassified Information, “CUI” is defined as information
created by the government, or an entity on behalf of the
government, that is unclassified, but needs safeguarding.
• CUI is information that is sensitive and relevant to the interests of
the United States and potentially its National Security, but not
strictly regulated by the Federal government.
• Unclassified Information which is stored on “Covered Contractor
Information Systems.”
Controlled Unclassified Information
6.
Examples of CUI
•Email
• Electronic files
• Blueprints, drawings
• Proprietary company/contractor information
• Physical records (printouts)
Controlled Unclassified Information
7.
2
3
4
5
What is NIST?
WhatAre the Requirements?Agenda
1
Do I Need to Comply?
How Can I Determine If I Am Compliant?
Corserva’s NIST Assessments
8.
Do I Needto Comply?
• Entities that deal with government controlled unclassified
information must comply.
• Typical entities with this kind of information include universities,
research institutions, consulting companies, service providers, and
manufacturers.
• Many manufacturing companies are either prime contractors or sub
for prime contractors for various government contracts. These
entities will almost always have CUI on premise or in cloud/provider
based systems and applications.
• Manufacturers must be compliant with NIST 800-171 by
December 31, 2017.
Is Compliance Mandatory?
9.
Have I BeenNotified?
• If you are a manufacturer, you may get notified by a prime
contractor or subcontractor stating that you need to comply with
NIST 800-171 by December 31st of 2017.
• Notification can come directly (mail or email) or can come as a
notification within a portal.
• You may not get notified at all.
Is Compliance Mandatory?
10.
2
3
4
5
What is NIST?
WhatAre the Requirements?Agenda
1
Do I Need to Comply?
How Can I Determine If I Am Compliant?
Corserva’s NIST Assessments
11.
NIST 800-171 Familyof Requirements
3.1 Access Control
3.2 Awareness and Training
3.3 Audit and Accountability
3.4 Configuration Management
3.5 Identification and
Authentication
3.6 Incident Response
3.7 Maintenance
NIST Requirements Family
3.8 Media Protection
3.9 Personnel Security
3.10 Physical Protection
3.11 Risk Assessment
3.12 Security Assessment
3.13 System and Communications
Protection
3.14 System and Information Integrity
12.
Defining the NIST800-171 Requirement
Four types of data management requirements:
1. Controls
Data management controls and processes
2. Monitoring/Management
Real time monitoring/management of defined IT systems
3. End User Practices
Documented, well defined end-user practices and procedures
4. Security Measures
Implementation of defined security measures
NIST Requirements
13.
NIST 800-171 Requirement:Controls
Controls Requirements
• Assess and develop appropriate security controls
• Development of Formal Policies and Procedures
• Creation and maintenance of audit records regarding access to CUI
• Secure transmission of data including encryption
• Encryption of data at rest
NIST Requirements: Controls
14.
NIST 800-171 Requirement:Monitoring/Management
Monitoring/Management Requirements
• Monitor and manage user access to information systems
• Authenticate users and utilize multi-factor authentication
• Establish an operational incident management process
• Patch critical systems and scan for vulnerabilities
• Deploy anti-virus/malware solutions and monitor activity
• Monitor network traffic for malicious activity
NIST Requirements: Monitoring/Management
15.
NIST 800-171 Requirement:End User Practices
End User Practices Requirements
• Training and awareness of end users and system administrators on
proper procedures for handling CUI
• Management must define and execute minimum password
complexity compliance
NIST Requirements: End User Practices
16.
NIST 800-171 Requirement:Security Measures
Security Measures Requirements
• Assess and develop appropriate security controls
• Secure backup of CUI
• Create and enforce policies to prevent unauthorized software
• Identify, track, and restrict access to network/application ports
(firewall/systems)
NIST Requirements: Security Measures
17.
Summary of NIST800-171 Requirements
NIST Requirements: Summary
18.
2
3
4
5
What is NIST?
WhatAre the Requirements?Agenda
1
Do I Need to Comply?
How Can I Determine If I Am Compliant?
Corserva’s NIST Assessments
19.
How Can IDetermine Compliance?
The easiest route to determining your compliance status is an assessment by an
outside 3rd party.
The assessment should consist of three phases:
1. information gathering
2. data analysis
3. preparation of findings for presentation to management
From this assessment, you will have a specific roadmap to follow in order to achieve
compliance.
Determining Compliance
20.
2
3
4
5
What is NIST?
WhatAre the Requirements?Agenda
1
Do I Need to Comply?
How Can I Determine If I Am Compliant?
Corserva’s NIST Assessments
21.
What Does aNIST Assessment Project Look Like?
• Several stages involved:
• Business process review
• Technical assessment (systems and network)
• Data analysis
• Post assessment: plan for ongoing validation on a regular basis
What Can You Expect
22.
About Corserva
Foundedin 1985 as a division of the Dun & Bradstreet Corporation
Focused on providing advanced technology solutions to mid market and enterprise clients
Managed Services include IT Managed Infrastructure, Managed Security, and Backup/Recovery
Life Cycle services include full life cycle management for all IT devices
Cloud Services including Private Cloud and Hybrid Cloud
Experienced, trained and certified engineers in every major IT discipline
Finely tuned operations capabilities, including 24 X 7 network operations and security monitoring
All services supported by two highly certified data centers (HIPAA and PCI compliance)
A number of clients in the manufacturing sector
Experienced provider of IT assessments including those for NIST and HIPAA
www.corserva.com