Just in Time for Spring: Revision 2 to NIST SP 800-171 Comes into Full Bloom
Client Alert | 1 min read | 03.12.20
The National Institute of Standards and Technology (NIST) recently released its final version of Revision 2 to the cybersecurity standard NIST Special Publication (SP) 800-171. While the security controls remain unchanged, Revision 2 now incorporates implementation guidance into each control. Importantly though, such guidance remains non-binding and is not intended to extend the scope of the controls’ requirements.
For future solicitations, Revision 2 will replace Revision 1 as the applicable standard under DFARS 252.204-7012. It remains to be seen how the finalization of Revision 2 will impact the Department of Defense’s Cybersecurity Maturity Model Certification (CMMC). Currently, many CMMC practices cite to Revision 1, while “Discussion” sections cite to the draft version of Revision 2.
Lastly, although introduced in draft form at the same time as Revision 2, the separate standard NIST SP 800-171B – describing enhanced security controls intended to mitigate the risks of Advanced Persistent Threats (APTs) – remains unfinalized.
Contacts

Partner, Crowell Global Advisors Senior Director
- Washington, D.C.
- D | +1.202.624.2698
- Washington, D.C. (CGA)
- D | +1 202.624.2500
Insights
Client Alert | 3 min read | 11.20.25
Design patents offer protection for the ornamental appearance of a product, focusing on aspects like its shape and surface decoration, as opposed to the functional aspects protected by utility patents. The scope of a design patent is defined by the drawings and any descriptive language within the patent itself. Recent decisions by the Federal Circuit emphasize the need for clarity in the prosecution history of a design patent in order to preserve desired scope to preserve intentional narrowing (and to avoid unintentional sacrifice of desired claim scope).
Client Alert | 3 min read | 11.20.25
Client Alert | 6 min read | 11.19.25
Client Alert | 4 min read | 11.18.25
DOJ Announces Major Enforcement Actions Targeting North Korean Remote IT Worker Schemes

