Skip to main content

NIST SP 800‑171: Securing Information and Technology

NIST SP 800‑171 compliance is more than checking boxes—it's about locking down Controlled Unclassified Information (CUI) through encryption, access controls, and secure architecture. This guide explains the System and Communications Protection controls you must implement to defend against breaches.

Featured image for NIST SP 800‑171: Securing Information and Technology

Key Takeaways (TL;DR)

  • Robust technology and information‑security protocols are essential to keep CUI safe while proactively defending against an ever‑evolving threat landscape.
  • Organizing network traffic, segmenting systems, and enforcing strict access controls reduce the risk of critical information being exposed to unauthorized sources.
  • Continuous employee education ensures personnel can recognize and prevent cyber‑security process lapses. citeturn0view0

Organizing Systems and Improving Cybersecurity Communications

NIST SP 800‑171's System and Communications Protection family (controls 3.13.1 – 3.13.16) focuses on locking down data in transit and at rest, regulating network traffic, and embedding security into system architecture from the start. citeturn0view0

Communication Boundary Protection (3.13.1)

Monitor and control communications at system boundaries with firewalls, intrusion‑detection systems (IDS), and role‑based access controls to detect anomalies and limit access to authorized users. citeturn0view0

Secure Architecture and Development (3.13.2)

Apply secure‑by‑design principles and software‑engineering best practices so security is baked into every layer of your infrastructure. citeturn0view0

Operator and Cyber‑Management Segregation (3.13.3)

Separate user functions from system administration to reduce privilege‑escalation risk, enforced through role‑based controls. citeturn0view0

Unsanctioned Data Transfer (3.13.4)

Prevent accidental or intentional CUI leakage via strict access controls, data‑loss‑prevention tools, and system isolation techniques. citeturn0view0

Network Segmentation for Public‑Facing Systems (3.13.5)

Keep internet‑facing services separate from internal networks to block lateral movement by attackers. citeturn0view0

Default‑Deny Traffic Policy (3.13.6)

Enforce a deny‑all, permit‑by‑exception policy at network boundaries, shrinking the attack surface dramatically. citeturn0view0

Prevent Split Tunneling on Remote Devices (3.13.7)

Disable simultaneous connections to organizational and external networks to ensure all traffic flows through secure channels. citeturn0view0

Encrypting CUI in Transit (3.13.8)

Use FIPS‑validated cryptography for data moving across networks to thwart interception and tampering. citeturn0view0

Automatic Session Termination (3.13.9)

Terminate network sessions after inactivity or at session end to prevent hijacking. citeturn0view0

Cryptographic Key Management (3.13.10 & 3.13.11)

Establish secure key‑management practices and rely on FIPS‑ or NSA‑approved algorithms for encryption. citeturn0view0

Disable Remote Activation (3.13.12)

Block remote activation of microphones, webcams, and similar devices; give users visible indicators when devices are active. citeturn0view0

Control Mobile Code Execution (3.13.13)

Restrict downloads to trusted sources and enforce mobile‑device‑management (MDM) to detect malicious scripts. citeturn0view0

Secure VoIP Traffic (3.13.14)

Deploy session‑border controllers (SBCs) to encrypt and monitor VoIP traffic, preventing call interception. citeturn0view0

Safeguard Communications Integrity (3.13.15)

Implement MFA and digital certificates to thwart man‑in‑the‑middle attacks and session hijacking. citeturn0view0

Protect CUI at Rest (3.13.16)

Encrypt stored CUI and restrict both digital and physical access to storage devices and repositories. citeturn0view0

Increase Safety, Decrease Risks

By proactively securing communication channels, enforcing encryption policies, and continuously monitoring for vulnerabilities, organizations strengthen their security posture and maintain trust with customers and partners. citeturn0view0

Ensuring NIST SP 800‑171 Compliance for DoD Contracts

Total Assure's experts help DoD contractors and Defense Industrial Base members meet 800‑171 requirements through gap assessments, control implementation, and 24/7 monitoring. Contact us for a free consultation on developing and maintaining your System Security Plan (SSP). citeturn0view0