Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Ronald S. Ross; Kelley L. Dempsey; Patrick Viscuso; Mark Riddle; Gary Guissanie;|
|Title:||Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations|
|Published:||June 18, 2015|
|Abstract:||[Superseded by SP 800-171 (June 2015, w/updates through 09/03/2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919562] The protection of Controlled Unclassified Information (CUI) while residing in nonfederal information systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfully carry out its designated missions and business operations. This publication provides federal agencies with recommended requirements for protecting the confidentiality of CUI: (i) when the CUI is resident in nonfederal information systems and organizations; (ii) when the information systems where the CUI resides are not used or operated by contractors of federal agencies or other organizations on behalf of those agencies; and (iii) where there are no specific safeguarding requirements for protecting the confidentiality of CUI prescribed by the authorizing law, regulation, or governmentwide policy for the CUI category or subcategory listed in the CUI Registry. The requirements apply to all components of nonfederal information systems and organizations that process, store, or transmit CUI, or provide security protection for such components. The CUI requirements are intended for use by federal agencies in contractual vehicles or other agreements established between those agencies and nonfederal organizations.|
|Citation:||Special Publication (NIST SP) - 800-171|
|Keywords:||contractor information systems, controlled unclassified information, CUI registry, derived security requirement, Executive Order 13556, FISMA, nonfederal information systems, security control, security requirement|
|Research Areas:||Cybersecurity, Standards|