Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST 800-172

NIST 800-172

NIST Special Publication 800-172 Enhanced Security Requirements for Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations is an extension of the existing NIST SP 800-171. Current version specifically focus on sensitive but unclassified information dealt by organizations on behalf of the federal government and puts forward additional security requirements and practices pertaining to it.

Main features of NIST 800-172 are:

  1. Additional Requirements for Safety: The book offers better controls that are grouped into 14 categories of controls:
  • Access Control
  • Awareness and Training
  • Audit and Accountability
  • Configuration Management
  • Identification and Authentication
  • Incident Response
  • Maintenance
  • Media Protection
  • Personnel Security
  • Physical Protection
  • Risk Assessment
  • Security Assessment
  • System and Communications Protection
  • System and Information Integrity
  1. Proactive Controls: Under NIST 800-172, proactive control includes threat hunting, encryption as well as continuous monitoring all of which will provide a workaround for future risks.
  2. Implementation Guidance: Publication details customised security requirements based on the varying risk levels of CUI. In that case, it also leaves room for adoption.

NIST SP 800-172 aims at assisting in bolstering the non-federal systems’ cybersecurity posture. In this case, the developed publication applies to sectors of critical infrastructure where preventing unauthorized access and disclosure as well as other advanced persistent threats is crucial.

Additional reading

HITRUST Certification

HITRUST Certification: Your Gateway to Robust Security

As the healthcare industry actively embraces cloud technology and the electronic transmission of PHI, it has become an increasingly soft target for malicious actors. While HIPAA lays the groundwork for protecting health information, there was a need for a comprehensive framework to address the gaps in the healthcare cybersecurity landscape. That’s when HITRUST came into…
NIST Asset Management

NIST Asset Management Beginners Guide

The biggest challenge that large organizations face is the handling of resources. This can include everything from computers, mobile devices, and other endpoint devices to operating systems, applications, data, and networks. Not knowing where each asset is or knowing how they function can prove problematic. Even more so when all of this is handled with…
test of controls

The 5 Tests Of Controls To Verify Cybersecurity Measures

An audit contains various steps like planning and preparation, selecting a focus area, creating a checklist, informing various teams, and so on. However, it cannot take place without the tests of controls. In fact, both SOC 1 and SOC 2 audits require testing relevant controls to ensure compliance validity. Hence, let’s understand what are the…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.