NIST Publishes Assessment Procedures for Enhanced Security Controls Used to Protect CUI
Client Alert | 1 min read | 03.18.22
The National Institute of Standards and Technology (NIST) recently published final assessment procedures for the enhanced security controls used to protect particularly sensitive forms of controlled unclassified information (CUI) from sophisticated adversaries. NIST SP 800-172A, Assessing Enhanced Security Requirements for Controlled Unclassified Information, articulates procedures and methods to assess contractor implementation of the 35 enhanced security controls found in NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171. The publication can be used to conduct first, second, and third-party assessments with varying degrees of rigor based on the assessor’s desired level of assurance.
The enhanced controls and corresponding assessment procedures are expected to impact contractors handling CUI associated with critical programs and high value assets. The Department of Defense (DoD) also plans to incorporate the requirements from NIST SP 800-172 into Level 3 of the Cybersecurity Maturity Model Certification (CMMC) The assessment procedures and methods in NIST SP 800-172A are expected to inform the government-led assessments needed for DoD contractors to achieve certification at CMMC Level 3.
Insights
Client Alert | 3 min read | 06.30.25
The New EU “Pharma Package”: Preparing for the Trilogues
On June 4, 2025, after nearly two years of intense debate and negotiation between the 27 EU Member States, the Council of the European Union adopted its position on the proposed overhaul of the EU general pharmaceutical legislative framework known as the new Pharma Package.
Client Alert | 3 min read | 06.26.25
FDA Targets Gene Editing Clinical Trials in China and other “Hostile Countries”
Client Alert | 3 min read | 06.26.25
Client Alert | 4 min read | 06.26.25
Ninth Circuit Affirms that CIPA Only Applies to Third-Party Eavesdropping