What Are the NIST 800-171 Requirements for Government Contractors?
Posted: March 5, 2026 to Compliance.
What Are the NIST 800-171 Requirements for Government Contractors?
NIST SP 800-171 requires government contractors to implement 110 security controls across 14 families to protect Controlled Unclassified Information (CUI) in non-federal systems. These requirements cover access control, incident response, audit and accountability, system protection, and 10 additional security domains. Compliance is mandatory for any contractor that processes, stores, or transmits CUI under federal contracts, and it forms the foundation for CMMC Level 2 certification.
The standard was developed by the National Institute of Standards and Technology and is referenced in DFARS clause 252.204-7012, which has been a contractual requirement since December 2017. Despite being required for years, a 2025 DoD Inspector General report found that fewer than 30 percent of assessed contractors had fully implemented all 110 controls. The introduction of CMMC third-party assessments is expected to close this compliance gap.
Why NIST 800-171 Matters for Contractors
NIST 800-171 compliance is not optional for contractors handling CUI. The consequences of non-compliance include loss of existing contracts, ineligibility for new contract awards, False Claims Act liability with treble damages, negative past performance evaluations, and exclusion from the defense industrial base supply chain.
In 2025, the Department of Justice collected over $60 million in cybersecurity-related False Claims Act settlements from contractors who misrepresented their compliance status. The DOJ Cyber-Fraud Initiative continues to pursue contractors who falsely claim NIST 800-171 compliance in their SPRS self-assessment scores.
The 14 Control Families Explained
NIST 800-171 organizes its 110 requirements into 14 control families. Each family addresses a distinct aspect of information security.
1. Access Control (22 Requirements)
The largest family, access control requires limiting system access to authorized users and restricting what those users can do. Key requirements include implementing least-privilege access, encrypting CUI on mobile devices, controlling remote access sessions, and separating duties of individuals to reduce insider risk. Organizations must maintain current account inventories and disable accounts within defined timeframes when personnel changes occur.
2. Awareness and Training (3 Requirements)
Personnel must receive security awareness training and role-based training for privileged users. Training must cover recognizing social engineering, phishing, and insider threats. Training records must be maintained as evidence of compliance.
3. Audit and Accountability (9 Requirements)
Systems must create audit logs of security-relevant events, protect those logs from unauthorized modification, and alert administrators when logging failures occur. Organizations must review logs regularly, correlate audit data across systems, and retain logs for a period sufficient to support incident investigation.
4. Configuration Management (9 Requirements)
Organizations must establish and maintain baseline configurations for systems, implement change control processes, restrict unauthorized software, and configure systems with the principle of least functionality. Security settings must be documented and enforced consistently across the environment.
5. Identification and Authentication (11 Requirements)
Every user and device must be uniquely identified and authenticated before accessing systems containing CUI. This family requires multi-factor authentication for network access to privileged and non-privileged accounts, replay-resistant authentication mechanisms, and prevention of identifier reuse.
6. Incident Response (3 Requirements)
Organizations must establish incident response capabilities including preparation, detection, analysis, containment, recovery, and user response activities. Incidents must be tracked, documented, and reported to designated officials. Incident response plans must be tested at defined intervals.
7. Maintenance (6 Requirements)
System maintenance must be performed using controlled and documented processes. Maintenance tools must be inspected and approved, remote maintenance must use encrypted sessions with multi-factor authentication, and equipment removed for off-site maintenance must have CUI sanitized from it first.
8. Media Protection (9 Requirements)
CUI stored on digital and physical media must be protected throughout its lifecycle. Requirements include marking media with CUI designations, controlling access to media, sanitizing media before disposal or reuse using NIST SP 800-88 guidelines, and encrypting CUI on portable storage devices.
9. Personnel Security (2 Requirements)
Organizations must screen individuals before granting access to systems containing CUI and ensure that CUI access is removed when personnel are terminated or transferred. These controls prevent unauthorized access through personnel lifecycle management.
10. Physical Protection (6 Requirements)
Physical access to systems, equipment, and operating environments must be limited, controlled, and monitored. Visitor access must be logged, escort requirements enforced, and physical access devices (keys, badges) managed throughout their lifecycle.
11. Risk Assessment (3 Requirements)
Organizations must periodically assess risk to operations, assets, and individuals resulting from system operation. Vulnerability scans must be performed at defined intervals and when new vulnerabilities are identified. Scan results and remediation activities must be documented.
12. Security Assessment (4 Requirements)
Security controls must be assessed periodically to confirm they are implemented correctly and producing the desired outcome. Organizations must develop and implement plans of action to correct deficiencies and address known vulnerabilities. Continuous monitoring strategies must be established.
13. System and Communications Protection (16 Requirements)
This family requires monitoring and controlling communications at system boundaries, employing architectural designs and software development techniques that promote security, separating user and system management functionality, and implementing cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission and at rest. FIPS-validated encryption is required.
14. System and Information Integrity (7 Requirements)
Organizations must identify and remediate system flaws in a timely manner, protect systems from malicious code, monitor security alerts and advisories, and implement mechanisms to detect unauthorized changes to software and information. Systems must monitor inbound and outbound communications for unusual or unauthorized activity.
NIST 800-171 Compliance Steps
Achieving compliance requires a structured approach. Petronella Technology Group recommends the following process based on our experience guiding hundreds of contractors through implementation.
Step 1: Define your CUI scope. Identify every system, network, application, and storage location that processes, stores, or transmits CUI. Create data flow diagrams showing how CUI moves through your environment. This scoping exercise directly determines the cost and complexity of your compliance program.
Step 2: Conduct a gap assessment. Evaluate your current security posture against each of the 110 requirements. Score each control as fully implemented, partially implemented, or not implemented. This assessment produces your initial SPRS score.
Step 3: Develop your System Security Plan. The SSP documents how your organization implements each of the 110 requirements. It must describe the system boundary, operating environment, security controls, and relationships with other systems. The SSP is a living document that must be updated whenever significant changes occur.
Step 4: Create your Plan of Action and Milestones. For any requirements that are not fully implemented, create a POA&M that describes the weakness, identifies responsible parties, establishes remediation milestones, and tracks progress. Under CMMC 2.0, POA&M items must be closed within 180 days of assessment.
Step 5: Implement remediation. Address gaps identified in the assessment, prioritizing critical controls that carry the most weight in SPRS scoring. Common remediation activities include deploying multi-factor authentication, implementing endpoint detection and response, encrypting CUI at rest and in transit, establishing a security information and event management (SIEM) system, and developing required policies and procedures.
Step 6: Calculate and submit your SPRS score. The Supplier Performance Risk System score is calculated by starting at 110 (perfect score) and subtracting weighted values for unimplemented controls. Scores range from negative 203 to positive 110. You must submit your score to the SPRS portal and update it whenever your compliance posture changes.
NIST 800-171 and CMMC Alignment
CMMC Level 2 maps directly to the 110 requirements in NIST SP 800-171 Revision 2. Organizations that have fully implemented NIST 800-171 are already prepared for CMMC Level 2 assessment. The key difference is verification: NIST 800-171 historically relied on self-attestation, while CMMC Level 2 requires third-party assessment by a C3PAO for contracts involving critical CUI.
NIST SP 800-171 Revision 3 was published in May 2024 and reorganizes the requirements, but CMMC 2.0 continues to reference Revision 2. Contractors should implement against Revision 2 for CMMC purposes while monitoring DoD guidance on when Revision 3 adoption will be required.
Common Compliance Challenges
Based on our work with defense contractors across the Raleigh-Durham area and nationwide, the most common obstacles to NIST 800-171 compliance include underestimating CUI scope (finding CUI in email, file shares, and personal devices beyond the defined boundary), multi-factor authentication deployment across all access points, achieving FIPS 140-2 validated encryption for data at rest and in transit, implementing comprehensive audit logging with sufficient storage and correlation capability, and maintaining documentation currency as the environment evolves.
Frequently Asked Questions
What is the difference between NIST 800-171 and NIST 800-53?
NIST 800-53 contains over 1,000 controls designed for federal information systems operated by government agencies. NIST 800-171 is a derived subset of 110 controls tailored for non-federal systems (contractor environments) that handle CUI. If you are a government contractor, 800-171 is your standard. If you operate a federal information system, 800-53 applies.
Do subcontractors need to comply with NIST 800-171?
Yes, if CUI is flowed down to the subcontractor. Prime contractors are required to flow down DFARS 252.204-7012 requirements to subcontractors who will handle CUI. Subcontractors must achieve the same level of compliance as the prime contractor for the CUI they handle.
How is the SPRS score calculated?
The SPRS score starts at 110 and subtracts weighted values for each unimplemented control. Weights range from 1 to 5 points per control. A perfect score of 110 means all controls are fully implemented. The minimum possible score is negative 203. DoD uses SPRS scores to assess contractor risk during source selection.
Expert Help with NIST 800-171
Implementing 110 security controls requires expertise across cybersecurity, IT operations, and compliance documentation. Petronella Technology Group has over 23 years of experience helping government contractors achieve and maintain NIST 800-171 compliance. Our services include gap assessments, SSP development, POA&M management, technology implementation, and CMMC assessment preparation.
Request your free NIST 800-171 gap assessment today.