DFARS / NIST 800-171 Compliant

DFARS / NIST 800-171 Compliant

Preventing the loss of sensitive information is one of the biggest challenges facing organizations in their day-to-day operations. Data loss prevention techniques are vital for establishing secure protocols.

It is not surprising that the National Institute of Standards and Technology (NIST) in their last special publication–NIST 800-171–devoted much of its attention to methods on data loss prevention, both from a technical, as well as best practices perspective.

Setting a High Bar

The standards of NIST 800-171 are high.

The document recommends several layers of protective measures for both the transfer and storage of data on company systems and devices.

NIST focuses heavily on access protocols, especially regarding controlled unclassified information, or CUI. The document urges that companies track and control any transfer, anywhere in the company network, of data falling into predetermined categories. Also to be logged are any changes to information systems utilized by a company.  Privacy and security notifications must be activated for when such transfers and changes are made.

Encryption standards of NIST are also pretty heavy. The Institute essentially tells companies to encrypt the storage and transfer of any data with substantial sensitivity levels including passwords. NIST also recommends full blanket encryption be implemented for all CUI on certain devices.

The Challenge?

Complying with the high standards of NIST comes with operational costs.

First off, while some of the blanket strategies recommended such as total encryption may add to an organization’s data security, the functional burden to a company implementing such methods are often overwhelming.

Additionally, classification systems often lack an intelligent approach to address the subtle differences between various pieces of data. The environment in which data and sensitive information is moving is also not black and white. It is impossible for a system based on preset protocols to distinguish between relevant recipients and users.

The Edge

The Data Loss Prevention solution of GTB addresses all of these challenges, allowing a firm to achieve the highest levels of data security on par with NIST standards, while not impeding flow of operations.

Using smart AI functions, GTB’s programs constantly monitor transfers and use to verify that users are made aware of the security risks associated with their activities.

On the encryption end, GTB DLP’s Crypt-n-Chive solution automatically activates encryption protocols for sensitive data based on intelligent algorithms, insuring encryption is limited to appropriate information only.

Additionally, GTB’s DLP system gives administrators total control over the flow of controlled CUI, allowing them to implement protocols manually based on specific company needs.

As a Federal contractor, do you meet  NIST SP 800-171 compliance?  

 

Contact us for a NIST CUI Assessment

Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.

Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.

Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.

Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.

  • Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
  • Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
  • Control your data across your entire domain in one Central Management Dashboard with Universal policies.
  • Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
  • Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
  • Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
  • Integrate with GRC workflows.
  • Reduce the risk of fines and non-compliance.
  • Protect intellectual property and corporate assets.
  • Ensure compliance within industry, regulatory, and corporate policy.
  • Ability to enforce boundaries and control what types of sensitive information can flow where.
  • Control data flow to third parties and between business units.