Boldon James Logo

NIST 800-171B: New Draft Publication Reveals 33 Enhanced Security Requirements

Reading Time: 4 minutes

In July, NIST released draft versions of two new publications: NIST SP 800-171 Revision 2: Protecting Controlled Unclassified Information in Non-federal Systems and Organizations and NIST SP 800-171B: Protecting Controlled Unclassified Information in Non-federal Systems and Organizations: Enhanced Security Requirements for Critical Programs and High Value Assets.

While NIST SP 800-171 Revision 2 sees little change, the new publication of NIST SP 800-171B has introduced 33 enhanced security requirements, “designed to protect DoD contractors (specifically, their high-value-assets and critical programs including CUI) from modern attack tactics and techniques related to Advanced Persistent Threats (APTs).”

“These enhanced security requirements included within NIST 800-171B are generally more prescriptive than the controls found in NIST 800-171, and they call out individual steps that should be implemented to protect against the Advanced Persistent Threat.”

Contractors and sub-contractors who work with the United States Department of Defense must review these new requirements and ensure their compliance where required, as enforcement under the False Claims Act is already underway.

NIST 800-171B

The 33 enhanced security requirements outlined in the new draft publication are as follows…

  1. Employ dual authorization to execute critical or sensitive system and organizational operations.
  2. Restrict access to systems and system components to only those information resources that are owned, provisioned or issued by the organization.
  3. Employ secure information transfer solutions to control information flows between security domains on connected systems.
  4. Provide awareness training focused on recognizing and responding to threats from social engineering, advanced persistent threat actors, breaches and suspicious behaviours; update the training at least annually or when there are significant changes to the threat.
  5. Include practical exercises in awareness training that are aligned with current threat scenarios and provide feedback to individuals involved in the training and their supervisors.
  6. Establish and maintain an authoritative source and repository to provide a trusted source and accountability for approved and implemented system components.
  7. Employ automated mechanisms to detect the presence of misconfigured or unauthorized system components and remove the components or place the components in a quarantine or remediation network that allows for patching, reconfiguration or other mitigations.
  8. Employ automated discovery and management tools to maintain an up-to-date, complete, accurate and readily available inventory of system components.
  9. Identify and authenticate systems and system components before establishing a network connection using bidirectional authentication that is cryptographically based and replay resistant.
  10. Employ password managers for the generation, rotation and management of passwords for systems and system components that do not support multifactor authentication or complex account management.
  11. Employ automated mechanisms to prohibit system components from connecting to organizational systems unless the components are known, authenticated, in a properly configured state or in a trust profile.
  12. Establish and maintain a full time Security Operations Center (SOC) capability.
  13. Establish and maintain a cyber incident response team that can be deployed to any location identified by the organization within 24 hours.
  14. Conduct enhanced personnel screening (vetting) for individual trustworthiness and reassess individual trustworthiness on an ongoing basis.
  15. Ensure that organizational systems are protected whenever adverse information develops regarding the trustworthiness of individuals with access to CUI.
  16. Employ threat intelligence to inform the development of the system and security architectures, selection of security solutions, monitoring, threat hunting and response and recovery activities.
  17. Establish and maintain a cyber threat hunting capability to search for indicators of compromise in organizational systems and detect, track and disrupt threats that evade existing controls.
  18. Employ advanced automation and analytics capabilities to predict and identify risks to organizations, systems or system components.
  19. Document or reference in the system security plan the risk basis for security solution selection and identify the system and security architecture, system components, boundary isolation or protection mechanisms and dependencies on external service providers.
  20. Assess the effectiveness of security solutions at least annually to address anticipated risk to the system and the organization based on current and accumulated threat intelligence.
  21. Assess, respond to and monitor supply chain risks associated with organizational systems
  22. Develop and update as required a plan for managing supply chain risks associated with organizational systems.
  23. Conduct penetration testing at least annually, leveraging automated scanning tools and ad hoc tests using human experts.
  24. Employ diverse system components to reduce the extent of malicious code propagation.
  25. Disrupt the attack surface of organizational systems and system components through unpredictability, moving target defense or non-persistence.
  26. Employ technical and procedural means to confuse and mislead adversaries through a combination of misdirection, tainting or disinformation.
  27. Employ physical and logical isolation techniques in the system and security architecture.
  28. Employ roots of trust, formal verification or cryptographic signatures to verify the integrity and correctness of security critical or essential software.
  29. Monitor individuals and system components on an ongoing basis for anomalous or suspicious behaviour.
  30. Ensure that Internet of Things (IoT), Operational Technology (OT) and Industrial Internet of Things (IIoT) systems, components and devices are compliant with the security requirements imposed on organizational systems or are isolated in purpose specific networks.
  31. Refresh organizational systems and system components from a known, trusted state at least twice annually.
  32. Conduct periodic reviews of persistent organizational storage locations and purge CUI that is no longer needed consistent with federal records retention policies and disposition schedules.
  33. Use threat indicator information relevant to the information and systems being protected and effective mitigations obtained from external organizations to inform intrusion detection and threat hunting.

Download the Fact Sheet to discover how Boldon James can help your organisation comply with NIST Regulations for CUI.

Quotations taken from the following Tripwire article.

No Comments Yet