Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST 800-172

NIST 800-172

NIST Special Publication 800-172 Enhanced Security Requirements for Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations is an extension of the existing NIST SP 800-171. Current version specifically focus on sensitive but unclassified information dealt by organizations on behalf of the federal government and puts forward additional security requirements and practices pertaining to it.

Main features of NIST 800-172 are:

  1. Additional Requirements for Safety: The book offers better controls that are grouped into 14 categories of controls:
  • Access Control
  • Awareness and Training
  • Audit and Accountability
  • Configuration Management
  • Identification and Authentication
  • Incident Response
  • Maintenance
  • Media Protection
  • Personnel Security
  • Physical Protection
  • Risk Assessment
  • Security Assessment
  • System and Communications Protection
  • System and Information Integrity
  1. Proactive Controls: Under NIST 800-172, proactive control includes threat hunting, encryption as well as continuous monitoring all of which will provide a workaround for future risks.
  2. Implementation Guidance: Publication details customised security requirements based on the varying risk levels of CUI. In that case, it also leaves room for adoption.

NIST SP 800-172 aims at assisting in bolstering the non-federal systems’ cybersecurity posture. In this case, the developed publication applies to sectors of critical infrastructure where preventing unauthorized access and disclosure as well as other advanced persistent threats is crucial.

Additional reading

EU Data Act 2023 Explained: How to Prepare for it ?

By 2025, transmission of 180 Zettabytes of data is projected within the EU. For context, 11 trillion gigabytes make 1 zettabyte. While GDPR does what it does best to protect the privacy and integrity of user data, the need for a regulation purpose built to cater to the age of IoT(Internet of Things) and cloud computing…

The rise of social engineering attacks and how to beat them

90% of phishing attacks, yes, you read that right, incorporate elements of social engineering, revealed Microsoft. Simply, social engineering is the art of manipulating people to give them what they want. So instead of hacking systems, they hack into humans, first by winning their trust, then exploiting it for their purpose, and then clearing their…

Cybersecurity Benchmarking: The Key to Unlocking Maturity and Resilience

Comparisons are often seen in a bad light– whether it’s your personal life, or your business performance. Sure, there’s no one size fits all, and why should you care what the others are up to? But what if benchmarking influences you in a better way? What if understanding what the competitors are doing better helps…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.