logo

Database

NIST 800-171

Last updated: 2023/09/18
logo

NIST Special Publication 800-171 named Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, provides agencies with recommended security requirements for protecting the confidentiality of controlled unclassified information (CUI) when the information is resident in nonfederal systems and organizations. The version used in this section is SP 800-171 revision 2, January 2021.

Control-Requirement Mapping

DefinitionRequirements
1_1. Limit system access to authorized users, processes acting on behalf of authorized users and devices
1_4. Separate the duties of individuals
1_5. Employ the principle of least privilege, including for specific security functions and privileged accounts
1_7. Prevent non-privileged users from executing privileged functions
1_9. Provide privacy and security notices
1_11. Terminate a user session after a defined condition
1_13. Employ cryptographic mechanisms to protect the confidentiality of remote access sessions
1_16. Authorize wireless access prior to allowing such connections
1_17. Protect wireless access using authentication and encryption
1_18. Control connection of mobile devices
1_19. Encrypt CUI on mobile devices and mobile computing platforms
1_20. Verify and control/limit connections to and use of external systems
3_6. Provide audit record reduction
3_7. Synchronizes internal system clocks with an authoritative source to generate time stamps for audit records
3_8. Protect audit information and audit logging tools from unauthorized access, modification, and deletion
3_9. Limit management of audit logging functionality to a subset of privileged users
4_2. Establish and enforce security configuration settings for information technology products
4_3. Track, review and log changes to organizational systems
4_6. Employ the principle of least functionality and provide only essential capabilities
4_7. Restrict, disable, or prevent the use of nonessential functions, ports, protocols, and services
5_1. Identify system users, processes acting on behalf of users, and devices
5_2. Authenticate or verify the identities of users, processes, or devices, as a prerequisite to allowing access to organizational systems
5_3. Use multifactor authentication for local and network access to privileged accounts
5_4. Employ replay-resistant authentication mechanisms
5_5. Prevent reuse of identifiers for a defined period
5_6. Disable identifiers after a defined period of inactivity
5_7. Enforce a minimum password complexity and change of characters when new passwords are created
5_9. Allow temporary password use for system logons with an immediate change to a permanent password
5_10. Store and transmit only cryptographically-protected passwords
5_11. Obscure feedback of authentication information