What Is NIST SP 800-171?
NIST Special Publication 800-171, "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations," defines security requirements for contractors and other organizations that process, store, or transmit Controlled Unclassified Information (CUI) on behalf of the federal government.
Published by the National Institute of Standards and Technology and referenced in DFARS 252.204-7012, NIST 800-171 is the cybersecurity backbone of DoD contractor compliance. CMMC Level 2 is built directly on its 110 requirements.
If you handle CUI — technical data, defense-related research, personally identifiable information (PII) in a federal context — you are required to implement NIST 800-171. This is not optional.
The 17 Control Families
NIST 800-171 organizes its 110 requirements into 17 control families. Each family addresses a specific security domain.
1. Access Control (AC) — 22 Requirements
The largest control family covers how users and processes access your systems and data. Key requirements include:
- AC.1.001 — Limit information system access to authorized users, processes, and devices
- AC.1.002 — Limit information system access to the types of transactions authorized users are permitted to execute
- AC.2.005 — Provide privacy and security notices consistent with CUI rules
- AC.2.006 — Limit use of portable storage devices on external systems
- AC.2.007 — Employ the principle of least privilege
- AC.3.017 — Separate the duties of individuals to reduce the risk of malevolent activity
- AC.3.018 — Prevent non-privileged users from executing privileged functions
Cloud implementation: IAM policies with least privilege, mandatory MFA enforcement, session policies, service control policies (SCPs) in AWS Organizations, Azure Policy assignments.
2. Audit and Accountability (AU) — 9 Requirements
Covers logging, monitoring, and audit trail requirements for CUI-handling systems.
- AU.2.041 — Ensure audit records establish what happened and who did it
- AU.2.042 — Review and update logged events
- AU.3.045 — Review and analyze audit records for indications of inappropriate activity
Cloud implementation: CloudTrail with all regions enabled, S3 access logging, VPC flow logs, CloudWatch Logs with 3-year retention (DoD requirement), centralized SIEM integration.
3. Awareness and Training (AT) — 3 Requirements
Covers security awareness training requirements. Relatively straightforward but often overlooked.
- AT.2.056 — Ensure personnel know their security responsibilities
- AT.2.057 — Ensure personnel are trained to perform assigned information security responsibilities
- AT.3.058 — Provide security awareness training on recognizing threats
4. Configuration Management (CM) — 9 Requirements
Covers secure baseline configurations and change management.
- CM.2.061 — Establish and maintain baseline configurations of information systems
- CM.2.062 — Establish and maintain security configuration settings
- CM.3.068 — Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services
Cloud implementation: AWS Config conformance packs, Azure Policy initiatives, infrastructure-as-code with security scanning, drift detection with automated remediation.
5. Identification and Authentication (IA) — 11 Requirements
Covers identity verification for users, devices, and services.
- IA.1.076 — Identify information system users, processes, and devices
- IA.1.077 — Authenticate (or verify) the identities of users, processes, or devices before allowing access
- IA.3.083 — Use multifactor authentication for local and network access to privileged accounts
- IA.3.084 — Employ replay-resistant authentication mechanisms
Cloud implementation: Mandatory MFA via IAM policies, hardware MFA for root/privileged accounts, service account lifecycle management, certificate-based authentication for non-human identities.
6. Incident Response (IR) — 3 Requirements
Covers the capability to respond to security incidents.
- IR.2.092 — Establish an operational incident-handling capability
- IR.2.093 — Track, document, and report incidents
- IR.3.098 — Test the organizational incident response capability
7. Maintenance (MA) — 6 Requirements
Covers system maintenance activities, particularly for out-of-band maintenance with elevated risks.
- MA.2.111 — Perform maintenance on organizational systems
- MA.2.113 — Require MFA for remote maintenance sessions
8. Media Protection (MP) — 9 Requirements
Covers the protection of CUI on physical and digital media.
- MP.1.118 — Protect system media containing CUI
- MP.2.119 — Limit access to CUI on system media to authorized users
- MP.3.122 — Mark media with necessary CUI markings and distribution limitations
Cloud implementation: Encryption at rest for all storage (EBS, S3, RDS, Azure Disk, GCP persistent disks), key management via KMS/Key Vault/Cloud KMS.
9. Personnel Security (PS) — 2 Requirements
Covers screening of individuals before granting access to CUI.
- PS.2.127 — Screen individuals prior to authorizing access
- PS.2.128 — Ensure CUI is protected during and after personnel actions such as terminations
10. Physical Protection (PE) — 6 Requirements
Covers physical access to facilities and systems. For cloud-hosted CUI, FedRAMP authorization of the underlying cloud service provider satisfies many physical protection requirements.
11. Risk Assessment (RA) — 3 Requirements
Covers the process of identifying, assessing, and prioritizing cybersecurity risks.
- RA.2.141 — Periodically assess the risk to organizational operations
- RA.2.142 — Scan for vulnerabilities in organizational systems and applications
- RA.3.144 — Periodically perform risk assessments
12. Security Assessment (CA) — 4 Requirements
Covers periodic assessment of security controls and corrective action processes.
- CA.2.157 — Periodically assess security controls to determine if they are effective
- CA.2.158 — Develop and implement plans of action for corrective actions
- CA.3.161 — Monitor security controls on an ongoing basis
13. System and Communications Protection (SC) — 16 Requirements
The second largest family covers network communications protection and boundary defense.
- SC.1.175 — Monitor, control, and protect organizational communications
- SC.3.177 — Employ FIPS-validated cryptography when used to protect the confidentiality of CUI
- SC.3.187 — Establish and manage cryptographic keys
- SC.3.190 — Protect the authenticity of communications sessions
Cloud implementation: TLS 1.2+ enforcement, FIPS-validated encryption modules (AWS GovCloud or GovCloud-equivalent configurations), VPC architecture with appropriate segmentation, WAF deployment.
14. System and Information Integrity (SI) — 7 Requirements
Covers malicious code protection, security alerts, and system monitoring.
- SI.1.210 — Identify, report, and correct information and system flaws
- SI.1.211 — Provide protection from malicious code
- SI.1.212 — Update malicious code protection mechanisms
- SI.2.216 — Monitor organizational systems to detect attacks and indicators of potential attacks
- SI.2.217 — Identify unauthorized use of organizational systems
NIST 800-171 Revision 3: What Changed
NIST SP 800-171 Revision 3 introduces significant structural changes that organizations need to understand:
Organization-Defined Parameters (ODPs)
Rev 3 introduces parameters that organizations define based on their specific risk context. For example, instead of prescribing a specific password length, Rev 3 allows organizations to define the minimum password length based on documented risk assessment.
This flexibility creates a compliance responsibility: organizations must document their ODP choices and be prepared to justify them to assessors based on their risk assessment.
Tighter Alignment with NIST 800-53
Rev 3 aligns more closely with NIST SP 800-53 Rev 5, the comprehensive catalog used for federal agency systems. This alignment makes it easier for organizations that operate in both contractor and direct federal contexts.
Enhanced Assessment Objectives
Rev 3 includes more detailed examination procedures for each requirement. Assessors have clearer guidance on what to examine, which generally means higher expectations for evidence and documentation.
CMMC is currently based on NIST 800-171 Rev 2. Watch for formal adoption of Rev 3 — organizations that begin transitioning now will be ahead when CMMC updates.
From Manual Checklists to Autonomous Enforcement
Traditional NIST 800-171 compliance programs operate on a checklist model: periodically review each of the 110 controls, document the current state, identify gaps, and create remediation tickets. This approach has three fundamental problems.
Problem 1: Point-in-Time Snapshots
A quarterly checklist tells you the state of your controls as of the last review. In a dynamic cloud environment, controls can drift out of compliance within hours of being reviewed. The checklist becomes stale the moment it's completed.
Problem 2: Evidence Collection Is Manual and Expensive
Preparing evidence for a CMMC assessment under the checklist model means gathering proof for all 110 controls. Screenshots, configuration exports, policy documents, log samples — assembled by hand before each assessment. For a mid-size organization, this is hundreds of hours of work.
Problem 3: Remediation Has Human Latency
When a checklist review identifies a gap, a human creates a ticket, assigns it to someone, and waits. In regulated environments where control drift creates real risk, this latency is a liability.
Autonomous Enforcement: The Alternative
Autonomous enforcement continuously evaluates each control against the actual state of your cloud environment:
- Policy engine maps each NIST 800-171 requirement to specific cloud resource configuration parameters
- Real-time evaluation compares actual resource state against required state continuously
- Drift detection identifies the moment a control falls out of compliance
- Automated remediation closes low-risk gaps without human intervention
- Continuous evidence logs every evaluation, decision, and remediation action into an assessment-ready audit trail
Under this model, CMMC assessment preparation becomes a report generation exercise — the evidence is already assembled.
Cloud Implementation Strategies by Domain
Access Control in the Cloud
Least privilege enforcement: Use AWS IAM Access Analyzer, Azure AD Privileged Identity Management, or GCP IAM Recommender to identify and eliminate excessive permissions.
MFA enforcement: Apply service control policies (SCPs) or Azure Policy to prevent console access without MFA. Enforce hardware MFA for root and privileged accounts.
Session management: Configure session duration limits and idle timeouts for console and API access. Use temporary credentials (IAM roles, Azure Managed Identities) rather than long-lived access keys.
Audit Logging in the Cloud
Comprehensive collection: Enable CloudTrail in all regions and accounts, enable S3 access logging and data events, enable VPC flow logs, and configure resource-level logging for sensitive services (RDS, Lambda, API Gateway).
Retention: Configure log retention policies meeting DoD requirements — typically 3 years for CUI-related audit logs.
Integrity protection: Enable CloudTrail log file validation, store logs in a dedicated security account with immutable storage (S3 Object Lock), and restrict access to log infrastructure.
Configuration Management in the Cloud
Baseline enforcement: Define approved configurations as code (Terraform, CloudFormation, Bicep) and enforce through pipeline policies that reject non-compliant deployments.
Drift detection: Enable AWS Config with conformance packs mapped to NIST 800-171, or Azure Policy with built-in NIST 800-171 initiatives. Configure alerts for any deviation from approved baselines.
Change management: Require peer review for infrastructure changes, enforce change management policies through IaC pipeline gates.
Cryptography in the Cloud
Encryption at rest: Enable encryption on all storage services — EBS volumes, S3 buckets, RDS instances, DynamoDB tables, Azure Disk, GCP persistent disks. Use customer-managed keys (CMK) for greater control.
Encryption in transit: Enforce TLS 1.2 minimum across all API endpoints, load balancers, and service-to-service communications. Disable weak cipher suites.
FIPS validation: For systems requiring FIPS 140-2 validated cryptography, use AWS GovCloud (US), Azure Government, or GCP configurations with FIPS-validated endpoints.
Common Compliance Failures
The Logging Gap
One of the most consistent findings in CMMC assessments is incomplete cloud audit logging. Common failures:
- CloudTrail not enabled in all regions
- Data plane events (S3 object access, Lambda invocations) not logged
- Log data not retained for required periods
- Log integrity not validated
The IAM Sprawl Problem
Cloud accounts accumulate IAM permissions over time as developers request access for specific tasks and permissions are never revoked. The result is an access control posture that looks reasonable in documentation but is severely over-privileged in practice.
The Drift Problem
Organizations configure their cloud environments correctly at assessment time and then experience drift as teams make changes, deploy new resources, or modify configurations without following established processes. The assessment-compliant state degrades gradually until it's significantly non-compliant.
The Shared Responsibility Misunderstanding
Organizations assume that because they're using a managed cloud service, the provider handles compliance. Cloud providers handle security of the cloud. You handle security in the cloud. Misconfiguring a managed service is your compliance failure, not the provider's.
Building Your NIST 800-171 Compliance Program
Step 1: Scope Definition
Define the boundary of your CUI environment. Every system in scope must meet all 110 controls. Use network segmentation, dedicated accounts, and access controls to minimize scope.
Step 2: Gap Assessment
Evaluate your current state against each of the 110 requirements. Be honest — an optimistic gap assessment leads to assessment surprises.
Step 3: Remediation Prioritization
Not all gaps are equal. Prioritize based on:
- Risk (which gaps represent the highest security exposure?)
- Assessment impact (which practices are weighted most heavily in CMMC scoring?)
- Implementation complexity (what can you fix quickly vs. what requires architectural changes?)
Step 4: Documentation
Build your System Security Plan. Document each control's implementation with honesty and specificity. Assessors value accurate documentation over optimistic claims.
Step 5: Continuous Monitoring
Deploy monitoring that evaluates your controls continuously against the 110 requirements. This is both a compliance requirement and an operational necessity.
Step 6: Evidence Automation
Automate evidence collection so that every control evaluation generates assessment-ready documentation. This transforms your assessment from a months-long sprint into a report generation exercise.
Conclusion
NIST 800-171 compliance is not a one-time project. It's a continuous operational discipline that requires real-time monitoring, automated enforcement, and ongoing evidence collection.
Organizations that treat it as a checklist exercise will struggle with assessment preparation and face drift problems between certifications. Organizations that build genuine continuous compliance programs — leveraging cloud-native tools and autonomous enforcement — achieve better security outcomes and significantly lower compliance costs.
Related reading:
About the Author
PolicyCortex Team
PolicyCortex was founded by a cleared technologist with active federal security clearances who has worked across the Defense Industrial Base, national laboratories (Los Alamos National Laboratory), and federal research organizations (MITRE). This first-hand experience with the security, compliance, and governance challenges facing regulated industries drives every design decision in the platform.
Ready for a Control Mapping Demo?
See how PolicyCortex replaces your disconnected compliance tools with one autonomous platform built for defense contractors and federal agencies.