Free Consultation
#cybersecurity
#nist
#privacy

NIST 800-171 Revision 3: Updated Requirements for CUI Protection

June 13, 2023

Nist 800-171 Revision 3: Updated Requirements for CUI Protection

NIST published the final version of Special Publication (SP) 800-171. Learn what the changes introduced through NIST 800-171 Revision 3Updated on May 2024.

On May 14, 2024, the National Institute of Standard and Technology (NIST) published the final version of Special Publication (SP) 800-171 Revision 3, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations and its companion assessment guide, NIST SP 800-171A, Revision 3. NIST SP 800-171 Revision 3 contains security controls intended to help government contractors safeguard Controlled Unclassified Information (CUI) received or generated during contract performance. NIST SP 800-171A is designed to help contractors assess their implementation of 800-171’s controls and describes the assessment procedure for all the compliance requirements. See our NIST SP 800-171 Self-Assessment Guide for more details.

This blog dives deeper into the NIST 800-171 Revision 3 updates. Let’s see what is new in the Revision 3.

What is NIST 800-171

NIST SP 800-171 serves as a foundational set of security requirements for Department of Defence (DoD) contractors to safeguard CUI - unclassified information the United States Government creates or possesses that requires safeguarding or dissemination controls limiting its distribution to those with lawful government purpose (DoD CUI Registry).

NIST requirements apply to non-federal system components that handle, store, or transmit CUI or provide protection for such components. The requirements outlined in NIST SP 800-171 are typically enforced through contractual arrangements or agreements between federal agencies (DoD) and nonfederal organizations (contractors).

Since its introduction in 2016, NIST 800-171 has undergone three revisions. The previous updates did not significantly change the requirements’ content. However, the latest, NIST 800-171 Revision 3, still has several significant changes that aim to impose stringent requirements on all government contractors and associated vendors that handle federal information.

While contractors who handle CUI are not required to implement Revision 3 for now ( as per class deviation to DFARS 252.204-7012), it is expected that the Department of Defense will eventually make it obligatory to follow by incorporating Revision 3 into both DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting (DFARS 7012) as well as the forthcoming Cyber Maturity Model Certification (CMMC) program.

Let’s dive deeper into the NIST 800-171 Revision 3 updates.

NIST 800-171 Revision 3 Control Families

NIST 800-171 evolves around a subset of controls necessary for safeguarding CUI. The previous two Revisions had 14 control families, but the current, Revision 3, expands to 17. The controls are organized as follows (The last three control families with an asterisk (*) have been added with Revision 3):

The new Planning family addresses developing and maintaining policies, procedures, and rules. It also requires developing and maintaining a system security plan (SSP), which moved here from the Security Assessment and Monitoring family in Revision 2.

The System and Service Acquisition family addresses security and engineering principles, requiring organizations to follow defined engineering requirements for developing and modifying systems and components. It also includes requirements to replace unsupported systems and ensure external system providers comply with identified security requirements.

The Supply Chain Risk Management family includes requirements for managing tools, services, and vendors within the supply chain.

While the number of control families increased by 3 with the latest revision, the number of control requirements dropped by 13 and now comprises 95 requirements. Out of these:

Section 3 of NIST SP 800-171 Revision 3 describes applicable requirements for each of the NIST 800-171 control families, including numerous subcategories of requirements within each family.

No More Distinction Between Basic and Derived Requirements

NIST 800-171 Revision 3 has eliminated the distinction between basic security requirements (requirements obtained from Federal Information Processing Standards (FIPS) 200) and derived requirements (taken from NIST SP 800-53). Revision 3 requirements were reworked using 800-53 as “the single authoritative source” in an effort to make the requirements clearer and more specific.

More Specific Security Requirements

With Revision 3, NIST 800-171, security requirements have been detailed in response to feedback that previous requirements were too open to interpretation. The new detailed security requirements aim to improve the implementation effectiveness and clarify the assessment’s scope.

For example, the modifier “periodically” was used in contractor requirements throughout SP 800-171, Revision 2 (e.g., Control 3.12.4 requires contractors to “[d]evelop, document, and periodically update system security plans…”). Now, it requires reviewing and updating the system security plan at an organization-defined frequency.

Introduction of Organization-Defined Parameters (ODPs)

NIST 800-171 Revision 3 includes organization-defined parameters (ODPs) for specific security requirements. The ODPs provide federal agencies with flexibility by allowing them to specify values for designated parameters (time period, circumstances, conditions, frequency, functions, and/or roles, etc.) within those security controls for safeguarding controlled unclassified information (CUI). See Appendix D of the NSIT 800-171 for more details.

Reflecting on the recent changes in NIST SP 800-53 and SP 800‑53B

In response to feedback that organizations are overwhelmed by the number of security and risk management frameworks, the updated NIST 800-171 requirements are now better aligned with NIST SP 800-53, rev. 5, and NIST SP 800-53B. To facilitate the harmonization of requirements, NIST has provided a Prototype CUI Overlay, which shows how the moderate control baseline in NIST SP 800-53B can be tailored to align with the NIST SP 800-171 security requirements.

When to Comply with NIST 800-171 Revision 3?

On May 2, 2024, the Department of Defense issued a class deviation to DFARS 252.204-7012 “to provide industry time for a more deliberate transition upon the release of NIST 800-171 Revision 3.” The deviation changes the requirement that contractors must comply with the version of the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 that is in effect when the government issues a solicitation. Instead, under the deviation, contractors are specifically directed to comply with NIST SP 800-171, Revision 2 (i.e., the current version) until the deviation is canceled.

To stay updated on recent cybersecurity and compliance-related topics, keep reading our blog. Feel free to contact the Planet 9 team for help with your security and compliance challenges. We’ll be happy to assist!  

Book a Free Consultation

Schedule a free consultation today to explore how Planet 9 can help you achieve your security and compliance goals.
Book Free Consultation

FAQs

How does a PTCISO service differ from hiring a full-time CISO?
A part-time CISO offers the same strategic oversight and expertise as a full-time CISO but on a flexible, cost-effective basis. It’s ideal for small to mid-sized businesses that need executive-level guidance without the overhead.
Is a virtual CISO service suitable for regulated industries like healthcare or finance?
Yes, virtual CISOs (or fractional CISOs) are especially valuable for industries with strict compliance requirements such as HIPAA, PCI DSS, or GLBA. They help ensure your organization meets regulatory standards and is prepared for audits.
What can I expect during a vCISO engagement?
Our vCISO service typically includes cybersecurity assessments, program development, compliance planning, incident response strategy, vendor risk management, and ongoing executive reporting tailored to your business.
How do I know if my business needs a CISO-as-a-Service?
If you lack in-house security leadership, struggle with compliance, or face growing cyber risks, a vCISO can fill that gap, providing strategic direction, improving resilience, and helping you make smarter security investments.

Related blog posts