<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cooey.wiki/index.php?action=history&amp;feed=atom&amp;title=NIST_SP_800-172</id>
	<title>NIST SP 800-172 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://cooey.wiki/index.php?action=history&amp;feed=atom&amp;title=NIST_SP_800-172"/>
	<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=NIST_SP_800-172&amp;action=history"/>
	<updated>2026-05-01T09:01:14Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://cooey.wiki/index.php?title=NIST_SP_800-172&amp;diff=38&amp;oldid=prev</id>
		<title>Marieramsay: Created page with &quot;[https://csrc.nist.gov/pubs/sp/800/172/final NIST SP 800-172], titled &quot;Enhanced Security Requirements for Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations,&quot; builds on the foundation of NIST SP 800-171. It provides additional security controls and enhancements for organizations that handle highly sensitive Controlled Unclassified Information (CUI), particularly when the risk of advanced persistent threats (APTs) is a concern.  H...&quot;</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=NIST_SP_800-172&amp;diff=38&amp;oldid=prev"/>
		<updated>2024-09-29T22:45:53Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;[https://csrc.nist.gov/pubs/sp/800/172/final NIST SP 800-172], titled &amp;quot;Enhanced Security Requirements for Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations,&amp;quot; builds on the foundation of NIST SP 800-171. It provides additional security controls and enhancements for organizations that handle highly sensitive Controlled Unclassified Information (CUI), particularly when the risk of advanced persistent threats (APTs) is a concern.  H...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[https://csrc.nist.gov/pubs/sp/800/172/final NIST SP 800-172], titled &amp;quot;Enhanced Security Requirements for Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations,&amp;quot; builds on the foundation of NIST SP 800-171. It provides additional security controls and enhancements for organizations that handle highly sensitive Controlled Unclassified Information (CUI), particularly when the risk of advanced persistent threats (APTs) is a concern.&lt;br /&gt;
&lt;br /&gt;
Here’s a breakdown of NIST 800-172:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;1. Purpose and Scope:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
NIST SP 800-172 is designed for environments that require enhanced protection due to a higher threat level. It focuses on mitigating risks from APTs, which are sophisticated, well-resourced adversaries that use a variety of tactics to infiltrate systems and remain undetected.&lt;br /&gt;
The publication supplements NIST 800-171 and is intended to be used in conjunction with it. While 800-171 establishes baseline protections for CUI, 800-172 is for organizations handling high-value or critical CUI, where the consequences of a breach would be more severe.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;2. Advanced Persistent Threats (APTs):&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
APTs refer to highly skilled and well-funded adversaries that use persistent and sophisticated techniques to infiltrate and exfiltrate sensitive data over long periods. Examples include nation-state actors targeting defense contractors.&lt;br /&gt;
The enhanced security requirements in 800-172 aim to defend against these advanced threats by implementing more rigorous and layered security controls.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;3. Key Security Control Enhancements:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
NIST SP 800-172 introduces 35 additional requirements that focus on:&lt;br /&gt;
&lt;br /&gt;
Cybersecurity Resilience: Strengthening the organization’s ability to detect, respond to, and recover from attacks, particularly by building in redundancy and response mechanisms.&lt;br /&gt;
Exfiltration and Infiltration Protection: Implementing measures to prevent adversaries from stealing or inserting malicious data, such as encrypted data storage and communications, multi-factor authentication, and monitoring for abnormal behavior.&lt;br /&gt;
Security Monitoring: Increasing the use of security analytics and monitoring tools to detect unusual activities, especially those that might indicate an APT is operating within the network.&lt;br /&gt;
Incident Response and Recovery: Enhancing the organization’s capability to respond to breaches by setting up robust incident response plans, continuous monitoring, and ensuring system backups and rapid restoration of critical services.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;4. Applicability:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
NIST 800-172 is not for all contractors but is recommended for organizations handling high-risk CUI or those working on critical federal programs like defense or national security-related projects.&lt;br /&gt;
For example, defense contractors working on projects with heightened risk from APTs (e.g., sensitive defense technologies, advanced research) would be expected to implement the controls in NIST 800-172 in addition to those required by NIST 800-171.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;5. CMMC Impact:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
The Cybersecurity Maturity Model Certification (CMMC), which is required for Department of Defense (DoD) contractors, also incorporates NIST SP 800-172 requirements at the highest levels (CMMC Levels 4 and 5). This means contractors handling sensitive DoD information may need to meet both NIST 800-171 and the enhanced protections outlined in 800-172.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;6. Key Focus Areas:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Enhanced Protection of CUI: Including encryption, access control, and multifactor authentication to prevent data leakage.&lt;br /&gt;
Defense Against Cyber Intrusions: Improving monitoring, logging, and response capabilities to detect and mitigate sophisticated cyber intrusions.&lt;br /&gt;
Data Integrity: Ensuring that information remains accurate and unaltered during storage, processing, or transmission.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Summary:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
While NIST 800-171 sets the baseline for protecting CUI, NIST 800-172 introduces enhanced security measures to counter advanced persistent threats (APTs). These additional controls are particularly relevant for organizations dealing with high-value or critical government projects, where the risk and consequences of data compromise are high.&lt;br /&gt;
&lt;br /&gt;
By implementing both 800-171 and 800-172, organizations can ensure that they not only meet federal security requirements but also bolster their defenses against the most sophisticated cyber threats.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
</feed>