NIST Compliance - National Institute of Standards and Technology
The National Institute of Standards and Technology (NIST) has released Special Publication 800-171. The document covers the protection of Controlled Unclassified Information (CUI) in Nonfederal Information Systems and Organizations.
Reach NIST certification readiness in just three months depending on the sized of your organization, drawing on our unique blend of practical cyber security know-how and proven management system consultancy expertise, our team will work with you to implement an NIST-compliant ISMS quickly and without hassle, no matter where your business is located.
NIST Framework Implementation with CyberSecOP
Below are some of the more commonly practiced NIST-800 Special Publications that Praetorian Secure has experience in assisting with implementation, design, authorization and configuration:
- NIST SP 800 Recommended Security Controls for Federal Information Systems and Organizations
- NIST SP 800 Assessing Security Controls
- NIST SP 800 Guide for Applying the Risk Management Framework
- NIST SP 800 Wireless Network Security
- NIST SP 800 IT Security Services
- NIST SP 800 Guideline on Network Security Testing
- NIST SP 800 IT Security Awareness and Training Program
- NIST SP 800 Contingency Planning for IT Systems
- NIST SP 800 Guidelines on Firewalls and Firewall Policy
- NIST SP 800 Securing Public Web Servers
- NIST SP 800 Email Security
- NIST SP 800 Interconnection IT Systems
- Certified Professional Security Consultants
NIST Security Program Overview
Risk Categorization: Organizations must categorize their information and information systems in order of risk to ensure that sensitive information and the systems that use it are given the highest level of security.
System Security Plan: NIST requires agencies to create a security plan which is regularly maintained and kept up to date. The plan should cover things like the security controls implemented within the organization, security policies, and a timetable for the introduction of further controls.
Security Controls: NIST outlines an extensive catalog of suggested security controls for NIST compliance. NIST does not require an agency to implement every single control; instead, they are instructed to implement the controls that are relevant to their organization and systems. Once the appropriate controls are selected and the security requirements have been satisfied, the organizations must document the selected controls in their system security plan.
Risk Assessments: Risk assessments are a key element of NIST’s information security requirements. NIST offers some guidance on how agencies should conduct risk assessments. According to the NIST guidelines, risk assessments should be three-tiered to identify security risks at the organizational level, the business process level, and the information system level.
Certification and Accreditation: NIST requires program officials and agency heads to conduct annual security reviews to ensure risks are kept to a minimum level. Agencies can achieve NIST Certification and Accreditation (C&A) through a four-phased process which includes initiation and planning, certification, accreditation, and continuous monitoring.