NIST 800-171: Protecting CUI

This article is for educational purposes only and does not constitute professional compliance advice or legal counsel. Standards and requirements evolve, and you should consult with a qualified security professional about your specific situation.


You've just won a contract to work with the Department of Defense, or you're a subcontractor to a company that works with the DoD, and the contract includes a requirement to meet NIST 800-171. You've heard that CMMC is related and probably coming. You know you handle CUI — Controlled Unclassified Information — but you're not entirely clear on what that means or what the standard actually requires from your organization. You need to understand what NIST 800-171 is, what it demands, and what the difference is between asserting compliance and actually proving it.

What NIST 800-171 Actually Is

NIST 800-171, officially titled "Security Requirements for Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations," is a standards document designed specifically for non-federal organizations that handle government data classified as CUI. This is distinct from NIST 800-53, which applies to federal information systems themselves. The 800-171 standard takes the broader controls from 800-53 and scales them specifically for the challenge of protecting CUI when that data is being processed in contractor environments outside direct federal control.

The standard covers 14 security requirement families and approximately 110 individual security requirements. These families overlap significantly with 800-53 but with a narrower focus. Access Control, Identification and Authentication, Audit and Accountability, System and Communications Protection, System Development and Lifecycle, and others are here, but 800-171 concentrates on the subset of controls that are most critical for protecting CUI specifically. A federal system protecting classified information might need 200+ controls. An organization protecting CUI in a contractor environment needs roughly 110 because some of the more exotic controls that apply to classified systems don't apply to unclassified information.

This distinction is important because it means 800-171 is less prescriptive and less onerous than 800-53, but it's also more specific to the actual problem of protecting government data outside federal agencies. If you're a defense contractor, 800-171 is designed precisely for your situation. If you're building federal systems, 800-53 is what applies.

The 14 Requirement Families and What They Cover

Access Control addresses who can access what information and systems and how that access is controlled. The requirement is that you have mechanisms to enforce access policy — role-based access, least privilege, separation of duties. The requirement is that access is reviewed periodically to ensure it's still appropriate. The requirement is that users can't access information outside their authorized scope.

Awareness and Training covers ensuring that your staff understands security obligations and their role in protecting CUI. You need training programs. You need to ensure that people who handle CUI understand what CUI is, why it matters, and what they're responsible for protecting.

Audit and Accountability covers logging who does what on your systems and what systems are generating logs. The requirement is that user actions are logged, system events are logged, and those logs are protected and reviewed. Audit trails must be able to prove who took what action and when. This is how you hold people accountable for their actions.

Configuration Management addresses how systems are set up and how changes to those configurations are managed. You need baseline configurations that are documented and verified. You need a change management process where changes don't just happen ad hoc. This prevents configuration drift where systems gradually become inconsistent or insecure.

Identification and Authentication covers how you verify who users are before they access systems or information. The requirement is that users authenticate — through passwords, multi-factor authentication, or other means. Users must be uniquely identified so actions can be attributed to them.

Incident Response covers detecting when something goes wrong and having procedures to respond. You need an incident response capability. You need to be able to detect incidents when they occur. You need procedures to contain and investigate them. You need to preserve evidence.

Maintenance addresses keeping systems updated and operational. You need processes for patching and updating systems. You need to manage the risk of maintenance activities introducing vulnerabilities.

Media Protection covers protecting physical storage media and portable devices. If CUI exists on a hard drive, USB drive, or laptop, you need controls to protect that media from loss, theft, or unauthorized access.

Physical and Environmental Protection covers securing facilities where CUI is processed or stored. You need to control who can access facilities. You need environmental controls to protect equipment. You need to prevent physical theft of systems or media.

Planning addresses documenting your security strategy and approach. You need a security plan that documents your security approach, roles and responsibilities, and how security is integrated into your operations.

Risk Assessment covers understanding what risks you face and how you're managing them. You need to assess what risks threaten your CUI. You need to document what controls you're implementing to manage those risks.

System and Communications Protection covers protecting information while it's in transit and protecting systems from attack. You need encryption for CUI in transit. You need firewalls and boundary protection. You need defenses against malware and other attacks.

System Development and Lifecycle covers security in how you build and maintain systems. You need security requirements in your system development process. You need to test systems for security before they go operational. You need security considerations in how systems are modified and eventually retired.

System Information Integrity covers detecting and preventing unauthorized changes to systems. You need malware protection. You need to monitor systems for signs of compromise. You need to detect unauthorized changes to system files and configurations.

Together, these 14 families provide comprehensive protection for CUI. They're not just security theater. They address the actual threats that face government information in contractor environments.

CUI and Why It Matters

Controlled Unclassified Information is information that the U.S. government creates, uses, or possesses that doesn't meet the threshold for classification but still requires protection. CUI includes technical data related to defense systems, information about federal research, information about federal acquisitions and contracts, and other sensitive government information. The common thread is that it's information that could harm the government, national security, or individuals if disclosed improperly, but it's not classified as Confidential, Secret, or Top Secret.

Defense contractors handle CUI because they work on government contracts that involve developing, maintaining, or modifying defense systems or supporting government operations. Federal contractors handle CUI because they're involved in federal programs and have access to sensitive but unclassified government information. Service providers to either of these categories often handle CUI because their systems process or store information that originated with their customers.

The DoD has made clear that protecting CUI is not optional for contractors. The Cybersecurity Maturity Model Certification, or CMMC, which has become a contractual requirement for most DoD contractors, is built on top of 800-171. If you want to do business with the Department of Defense, you need to meet 800-171 requirements. Even if your contract hasn't explicitly mentioned CMMC yet, it's coming for most contractors.

The Implementation Reality

Implementing 800-171 is not a paper exercise. It requires actual changes to how you operate. It starts with understanding what CUI you have and what systems process it. Many organizations discover during this assessment that they have no clear picture of what information they're handling. Where is CUI stored? What systems process it? Who has access to it? Until you have a clear answer, you can't implement controls.

From there, you conduct a risk assessment. What threats are most relevant to your organization? What vulnerabilities do you have? What would the impact be if CUI were compromised? You might be a small organization with simple systems and well-defined data flows, or a large organization with complex infrastructure. Your risk profile drives which controls are most critical.

You then identify which 800-171 requirements apply to your environment. Not every organization needs to implement every requirement identically. A small company with 20 employees and straightforward operations might implement some requirements more simply than a large organization. But you can't skip requirements because they're inconvenient. If a requirement applies to protecting CUI in your environment, you implement it.

From there, you prioritize gaps and build a remediation roadmap. What are you not currently doing that you need to be? You implement controls sequentially rather than trying to do everything at once. A typical timeline for a small organization is six to twelve months to implement core controls. A larger or more complex organization might need longer.

As you implement, you start gathering evidence. Evidence is what proves you've actually implemented the control. Evidence for access control is documentation of your access policy, proof that access controls are enforced on your systems, audit logs showing access control is working. Evidence for encryption is configuration of encryption on your systems and tests showing it's functioning. Evidence for monitoring is log data showing monitoring is occurring. By the time you need to prove compliance, you should have comprehensive evidence collection already underway.

Assessment and Proving Compliance

This is where the distinction between claiming compliance and proving compliance becomes critical. For years, organizations could claim 800-171 compliance and nobody would formally verify it. That's changing. CMMC requires third-party assessment. Your contract might require an 800-171 assessment. Your larger customers might require it as a condition of working with you.

A formal assessment involves an independent assessor reviewing your controls and documenting evidence. The assessor conducts interviews with your team, reviews your policies and procedures, tests controls on your systems, and examines logs and configurations. The outcome is an assessment report that documents what you're doing, where you're compliant, and where you have gaps or findings.

The assessment is not pass-fail in the traditional sense, but assessment findings are serious. If an assessor documents that you claim encryption but haven't actually implemented it, that's a finding. If you claim to have an incident response plan but the plan is vague and nobody has trained on it, that's a finding. The assessment is where the gap between intent and reality becomes obvious.

Many organizations now conduct self-assessments before formal assessments so they can identify and fix obvious gaps first. Even if your contract hasn't required assessment yet, understanding how an assessor would evaluate you is valuable.

Ongoing Compliance Is Where Most Organizations Fail

This is the part that organizations understand in theory but struggle with in practice. Implementing 800-171 once doesn't mean you're always compliant. Your systems change. New vulnerabilities emerge. Staff turnover means you lose people who understood the controls. New employees need training. Controls gradually degrade if they're not maintained actively.

Ongoing maintenance requires processes and ownership. Someone needs to be responsible for access control review — periodically auditing who has access to what and ensuring it's still appropriate. Someone needs to own patch management — ensuring systems stay current with security updates. Someone needs to review logs and audit data regularly — looking for suspicious activity. Someone needs to maintain your security policies and procedures — updating them as your systems and threats change.

This is not something you can bolt onto your existing operations. It requires organizational discipline and allocated resources. A common failure pattern is organizations that implement controls, get assessed, get certified or meet contract requirements, and then take their foot off the gas. Then a year later something happens and they realize their controls have drifted significantly.

The organizations that stay compliant are the ones that treat 800-171 compliance as ongoing operational work, not as a project that ends.

What Comes Next

You now understand NIST 800-171 as a standards framework specifically designed for non-federal organizations protecting government information. You know it covers 14 requirement families and about 110 individual requirements. You understand that implementation isn't just documentation — it requires actual operational changes. You understand that proving compliance through assessment is increasingly important and increasingly required.

Your next step is to assess your current state against the 14 families, identify gaps, and develop a roadmap for implementation. If you're working toward CMMC, understand that CMMC is built on 800-171 but CMMC assessment is also going to verify your controls more rigorously than you might be comfortable with if you're just going through the motions.


Fully Compliance provides educational content about IT compliance and cybersecurity. This article reflects general information about NIST 800-171 as of its publication date. Standards, requirements, and assessment methodologies evolve — consult a qualified security professional for guidance specific to your organization.