Skip to main content
NIST SP 800-171 Revision 3 — 2024 Final

NIST 800‑171 R3
Compliance Documentation
That Actually Works

Battle-tested documentation templates and implementation guidance for protecting Controlled Unclassified Information (CUI) in nonfederal systems. Best-in-class documentation structure provides the most comprehensive approach to being secure, compliant and resilient. Leverages the Secure Controls Framework (SCF) to scale compliance requirements beyond NIST SP 800-171 R3.

110+
Security Requirements
17
Control Families
CMMC
Level 2 Foundation

Key Changes in NIST SP 800‑171 R3

NIST SP 800-171 Revision 3, finalized in May 2024, represents the most significant update to the standard since its original publication. Organizations transitioning from R2 should understand the scope of changes before attempting self-assessment or submitting a CMMC assessment.

The most impactful change is the introduction of Organization-Defined Parameters (ODPs) — which require organizations to specify tailored values for certain controls rather than accepting undefined defaults. This creates additional documentation obligations but also provides flexibility.

ComplianceForge publishes a free NIST 800-171 R3 Transition Guide that walks through every significant change in detail — highly recommended reading before beginning your compliance program.

1

17 Control Families (Restructured from 14)

R3 reorganized the control families, adding Planning (PL), System and Services Acquisition (SA), and Supply Chain Risk Management (SR) as standalone families.

→ New Families Added
2

Organization-Defined Parameters (ODPs)

Many controls now require organizations to define specific values — timeframes, thresholds, frequencies. These must be documented in the SSP and justified.

→ Documentation Required
3

Supply Chain Risk Management (SCRM)

SR is now a full control family with requirements for managing third-party risk, component provenance, and supply chain threat analysis.

→ New Requirements
4

Enhanced Assessment Objectives

R3 provides more granular assessment objectives per control, aligning to NIST SP 800-171A R3. Evidence requirements are more specific and explicit.

→ Increased Specificity
5

Alignment with NIST CSF 2.0 & SP 800-53r5

R3 harmonizes more closely with NIST CSF 2.0 and SP 800-53 Rev 5, including Govern function controls and enhanced privacy considerations.

→ Framework Harmonization

What Documentation Does
NIST 800-171 R3 Require?

NIST SP 800-171 R3 compliance requires specific documentation artifacts. ComplianceForge provides all required templates pre-mapped and ready to customize.

S

System Security Plan (SSP)

The cornerstone document describing how each security requirement is implemented. Required by CA.L2-3.12.4. Must include ODPs for all applicable controls.

P

Plan of Action & Milestones (POA&M)

Documents deficiencies, planned remediation actions and milestones. Required to demonstrate active management of security gaps to assessors.

P

Policies & Procedures

Documented security policies covering all 17 control families. Must address roles, responsibilities and frequency of activities with organization-specific tailoring.

E

Evidence & Artifacts

Technical evidence supporting each implemented control — configuration screenshots, scan results, training records, access review logs and system inventories.

S

Scoping Documentation

A documented assessment boundary defining which systems, people and facilities are in scope for CUI protection. The USG zone-based model provides the standard methodology.

NIST 800-171 Compliance Program
(NCP) – Battle Tested Solution

The NIST 800-171 Compliance Program (NCP) is purpose-built for NIST SP 800-171 R3 compliance — a “square peg for a square hole” solution with everything you need to demonstrate compliance with the standard. Battle-tested, efficient and proven effective for small to mid-sized organizations handling CUI.

Every required artifact is included: System Security Plan (SSP), Plan of Action & Milestones (POA&M), policies, standards, procedures and assessment tools — all pre-mapped to NIST SP 800-171 R3 requirements and the Secure Controls Framework.

NIST SP 800-171 R3Fully Mapped
SSP + POA&MIncluded
CMMC ReadyLevel 1 & Level 2 Alignment
SCF-PoweredComprehensive Coverage

Two Proven Paths to
NIST 800-171 R3 Compliance

ComplianceForge offers two documentation bundles for NIST SP 800-171 R3 compliance — choose the one matched to your organization’s size, complexity and CMMC requirements.

Small & Mid-Sized Organizations

NIST 800-171
Compliance Program

NCP

The streamlined, purpose-built solution for organizations that need straightforward NIST SP 800-171 R3 compliance without unnecessary complexity. Everything you need — nothing you don’t.

  • Complete System Security Plan (SSP) template mapped to R3
  • Plan of Action & Milestones (POA&M) workbook
  • All required cybersecurity policies & procedures
  • NIST SP 800-171 R3 control mapping & ODPs
  • Assessment guide and evidence templates
  • CMMC Level 2 alignment documentation
  • Streamlined for SMB efficiency — no bloat
Ideal for: Small to mid-sized DoD contractors, federal suppliers and subcontractors handling CUI who need proven, efficient documentation.
Get the NCP →

Not sure which to choose? The NCP is the right choice for most organizations handling CUI under DFARS 252.204-7012 requirements. SCF Bundle 1 is the better fit if you have a large, complex environment, pursue CMMC Level 3, or need enterprise-grade cross-framework coverage. Read the full comparison →

What Is NIST SP 800-171 R3?

NIST Special Publication 800-171 establishes the requirements for protecting Controlled Unclassified Information (CUI) in nonfederal systems and organizations. Revision 3 (R3), finalized in 2024, is the current version all organizations must comply with.

If your organization works with the federal government — especially the Department of Defense — and handles CUI under a contract, you are almost certainly required to implement NIST SP 800-171 R3 under DFARS 252.204-7012. This forms the technical foundation for the CMMC (Cybersecurity Maturity Model Certification) Level 2 program.

Compliance requires a documented System Security Plan (SSP), a Plan of Action & Milestones (POA&M), and evidence that security requirements are being implemented — not just claimed. That’s where documentation templates save significant time and cost.

110+ security requirements across 17 control families
Mandatory for DoD contractors under DFARS 252.204-7012
Forms the basis of CMMC Level 2 (and most of Level 3)
Required for GSA contractors per CIO-IT Security 21-112
Canadian alignment via ITSP.10.171 for Canadian industry
R3 introduced Organization-Defined Parameters (ODPs)
Applicable Authorities & Frameworks
DFARS 252.204-7012
CMMC 2.0
FAR 52.204-21
32 CFR Part 2002
ITSP.10.171
GSA CIO-IT 21-112
EO 13556
NIST CSF 2.0

What Is CUI?

Controlled Unclassified Information (CUI) is government-owned or generated information that requires safeguarding per law, regulation or policy — but is not classified. Examples include technical data, export-controlled information, privacy data and law enforcement sensitive information.

Scoping Failure = Compliance Failure

Many organizations fail to properly scope their CUI environment before implementing controls. Without a clear assessment boundary, you may over-scope the entire network or under-scope and miss critical systems. The Unified Scoping Guide (USG) provides the official scoping framework.

Self-Assessment vs. C3PAO

CMMC Level 1 requires annual self-assessments. Level 2 requires either annual self-assessment (for certain programs) or triennial third-party C3PAO assessment. Level 3 requires DIBCAC government-led assessments. NIST SP 800-171 R3 provides the technical baseline for all levels.

The SCF Advantage:
One Framework, All Requirements

The Secure Controls Framework (SCF) is a free, open-source meta-framework that maps over 100 laws, regulations and standards into a single unified control set. It is the most comprehensive cybersecurity & data privacy control catalog available.

ComplianceForge builds all its documentation on the SCF backbone — meaning your NIST SP 800-171 R3 documentation is already pre-mapped to CMMC, ISO 27001, NIST CSF 2.0, SOC 2, HIPAA and dozens of other frameworks. Implement once, satisfy many.

The SCF also provides the Secure Controls Framework Conformity Assessment Program (SCF CAP) for third-party assessments and certifications — giving organizations a single path to multi-framework compliance validation.

🗺️

100+ Frameworks Pre-Mapped

NIST SP 800-171 R3, CMMC, ISO 27001, NIST CSF 2.0, SOC 2, HIPAA, FedRAMP, GDPR and more — all mapped in a single control framework.

📋

SSP & Evidence Templates

Pre-built System Security Plan templates with control narrative language and evidence collection guidance aligned to NIST SP 800-171 R3 assessment objectives.

⚙️

Organization-Defined Parameters

R3 introduced ODPs requiring tailored values. ComplianceForge documentation includes ODP guidance with recommended values and rationale for all applicable controls.

🔗

Supply Chain Risk Management

R3 added SCRM requirements. SCF-based documentation includes supply chain controls, third-party assessment templates and flow-down requirement guidance.

📈

Scalable from SMB to Enterprise

Whether you use the NCP for lean compliance or SCF Bundle 1 for enterprise-grade documentation, both are built on the same SCF foundation and scale with your program.

All 17 Control Families

NIST SP 800-171 Revision 3 contains 110+ security requirements organized across 17 control families. Three families — Planning, System Acquisition, and Supply Chain Risk Management — are new in R3.

AC

Access Control

Limit system access to authorized users, processes, and devices. Includes account management, least privilege, remote access controls and access enforcement.

AT

Awareness & Training

Ensure personnel are aware of CUI security risks and are trained on applicable policies, procedures and practices to carry out their security responsibilities.

AU

Audit & Accountability

Create and retain system audit logs to enable monitoring, analysis and investigation of unlawful or unauthorized system activity. Protect audit information.

CA

Assessment, Authorization & Monitoring

Periodically assess security controls, develop and implement plans of action, connect to external systems through controlled interfaces and monitor continuously.

CM

Configuration Management

Establish and maintain baseline configurations. Control changes, track inventories and restrict unauthorized software, firmware and hardware.

IA

Identification & Authentication

Identify system users, processes and devices. Authenticate identities before allowing access. Includes MFA, password management and authenticator lifecycle.

IR

Incident Response

Establish an operational incident-handling capability covering preparation, detection, analysis, containment, recovery and reporting to appropriate authorities.

MA

Maintenance

Perform maintenance on organizational systems. Provide controls on tools, techniques, mechanisms and personnel that perform maintenance activities.

MP

Media Protection

Protect system media containing CUI, both paper and digital. Limit access, sanitize or destroy media before disposal or reuse. Control transport.

PE

Physical Protection

Limit physical access to systems and equipment to authorized individuals. Protect and monitor the physical facility and provide physical access audit logs.

PL

Planning New in R3

Develop, document and periodically update system security plans that describe security requirements and controls. Includes rules of behavior and security architecture.

PS

Personnel Security

Screen individuals prior to authorizing access. Ensure CUI is protected during and after personnel actions such as transfers and terminations.

RA

Risk Assessment

Assess risk to operations, assets and individuals. Scan for vulnerabilities periodically and remediate findings. Includes supply chain risk considerations.

SA

System & Services Acquisition New in R3

Allocate adequate resources for information security. Employ system development life cycle practices and secure engineering principles across acquisition processes.

SC

System & Communications Protection

Monitor, control and protect communications at external boundaries and key internal boundaries. Implement network segmentation and protect CUI at rest and in transit.

SI

System & Information Integrity

Identify, report and correct information and system flaws. Provide malicious code protection, monitor systems and alerts, and protect against unauthorized code execution.

SR

Supply Chain Risk Management New in R3

Establish a supply chain risk management program. Identify and address supply chain threats, assess suppliers, and manage risks associated with CUI in the supply chain.

What Makes ComplianceForge
Documentation Different

The documentation market is flooded with templates that look compliant but fail under actual assessment scrutiny. ComplianceForge documentation is built differently — engineered on the Secure Controls Framework (SCF), the most comprehensive cybersecurity control catalog available.

Every control narrative is written to align with NIST SP 800-171A R3 assessment objectives — meaning your SSP documentation is specifically designed to satisfy what assessors actually test for, not just nominally reference the requirement.

The SCF cross-framework mapping means your NIST SP 800-171 documentation simultaneously satisfies CMMC Level 2, NIST CSF 2.0, ISO 27001 and other frameworks — reducing audit fatigue and supporting multi-framework compliance with one set of authoritative documentation.

ComplianceForge Principle

“Good documentation does not just describe what you do — it proves you understand why you do it and demonstrates it at scale. Every ComplianceForge template is written with the assessor’s questions in mind.”

🎯

Written for Assessors

Control narratives aligned to NIST SP 800-171A R3 assessment objectives — not generic descriptions, but evidence-ready implementation statements.

🗂️

Complete Documentation Suite

Not just policies — SSP, POA&M, procedures, standards, controls catalog and evidence templates all provided in a coherent, integrated package.

🔄

Multi-Framework by Design

SCF-based mapping means one documentation investment covers NIST 800-171, CMMC, ISO 27001, NIST CSF 2.0, HIPAA and more simultaneously.

📐

ODP Guidance Included

R3 Organization-Defined Parameters are addressed throughout with recommended values, acceptable ranges and rationale for each ODP-enabled control.

🔒

Battle-Tested in Real Assessments

ComplianceForge documentation has been used in real CMMC, DCSA and federal assessments. It’s not theoretical — it’s proven under real scrutiny.

📦

Immediate Delivery, License to Customize

Delivered electronically and licensed for customization. Start your compliance program the same day without waiting for consultants or custom development.

NIST 800-171 R3 Across
Regulations & Standards

NIST SP 800-171 R3 doesn’t exist in isolation. Understand how it fits into the broader regulatory and compliance landscape.

🛡️

CMMC 2.0 (Level 2 & 3)

NIST SP 800-171 R3 is the technical foundation for CMMC Level 2 and forms the core of Level 3. All 110+ requirements in 800-171 appear in CMMC Level 2. Organizations pursuing CMMC certification must demonstrate full 800-171 R3 compliance.

DFARS 252.204-7021
📑

DFARS 252.204-7012

The primary DoD contract clause requiring NIST SP 800-171 implementation for contractors handling CUI. Requires an SSP, POA&M and a SPRS score submission to the Supplier Performance Risk System.

DoD Contractors
🏛️

GSA CIO-IT Security 21-112

GSA’s procedural guide requires federal contractors processing CUI on non-federal systems to comply with NIST SP 800-171. Applies across GSA contract vehicles and supply chain participants.

GSA Contractors
🍁

ITSP.10.171 (Canada)

The Canadian Communications Security Establishment (CSE) published ITSP.10.171 to guide Canadian organizations protecting specified information for non-Government of Canada systems — closely aligned with NIST SP 800-171.

Canadian Industry

Executive Order 13556 & 32 CFR Part 2002

The executive order establishing the CUI program and its implementing regulation define what constitutes CUI and who must protect it — providing the authority for NIST SP 800-171 applicability.

CUI Governing Authority
🌐

NIST CSF 2.0 & SP 800-53 Rev 5

NIST SP 800-171 R3 was updated to harmonize with NIST CSF 2.0 and SP 800-53 Rev 5. SCF-based documentation bridges all three, enabling organizations to satisfy multiple NIST standards simultaneously.

Framework Harmonization

Frequently Asked Questions

What is NIST SP 800-171 Revision 3?

NIST SP 800-171 R3 is the current version of the standard for protecting Controlled Unclassified Information (CUI) in nonfederal systems, finalized in May 2024. It expanded from 14 to 17 control families and introduced Organization-Defined Parameters (ODPs) requiring organizations to tailor specific control values.

Who is required to comply with NIST 800-171?

Any organization with a DoD contract that involves CUI under DFARS 252.204-7012. GSA contractors per CIO-IT Security 21-112. Canadian contractors handling specified information under ITSP.10.171. Any entity in the DoD supply chain that may encounter CUI through contract performance.

What changed from R2 to R3?

R3 added three new control families (Planning, System Acquisition, Supply Chain Risk Management), introduced ODPs for control tailoring, enhanced assessment objectives, and aligned more closely with NIST CSF 2.0 and SP 800-53 Rev 5. ComplianceForge’s free R3 Transition Guide documents all changes in detail.

What is the difference between NCP and SCF Bundle 1?

The NCP is purpose-built for NIST SP 800-171 R3 compliance — ideal for smaller to mid-sized organizations seeking efficient, focused compliance. SCF Bundle 1 is the enterprise-grade option including the full Digital Security Program (DSP) with broader cross-framework coverage, more depth and better suited to complex, large-scale environments.

Does NIST 800-171 R3 satisfy CMMC Level 2?

Yes. CMMC Level 2 is essentially NIST SP 800-171 — all 110+ requirements map directly to CMMC Level 2 practices. If you achieve full NIST SP 800-171 R3 compliance with documented evidence, you have the technical foundation for CMMC Level 2 certification by a C3PAO.

What are Organization-Defined Parameters (ODPs)?

ODPs are placeholders in certain NIST SP 800-171 R3 controls where organizations must specify their own tailored values — such as the frequency of access reviews, password complexity requirements or session timeouts. These values must be documented in your SSP and justified based on organizational risk decisions.

What is the Secure Controls Framework (SCF)?

The SCF is a free, open-source meta-framework that harmonizes 100+ cybersecurity laws, regulations and standards into a single comprehensive control set. ComplianceForge builds all documentation on the SCF, meaning NIST 800-171 documentation simultaneously maps to CMMC, ISO 27001, NIST CSF 2.0 and more.

What is the SPRS score and how does it relate to 800-171?

The Supplier Performance Risk System (SPRS) score is a self-assessed score from -203 to 110 representing your NIST SP 800-171 compliance posture. Contractors must submit this score under DFARS 252.204-7019. A well-documented SSP and POA&M are essential to calculating and defending your SPRS score.

Get NIST 800-171 R3 Compliant —
The Right Way

ComplianceForge provides the only documentation built on the Secure Controls Framework — proven in real assessments, mapped to every major framework, and designed to satisfy NIST SP 800-171 R3 compliance at any scale. Choose the NCP for streamlined SMB compliance or SCF Bundle 1 for enterprise-grade coverage.

17 Families
All Control Families Covered
100+ Maps
Frameworks Pre-Mapped
SCF-Powered
Best-in-Class Framework
CMMC Ready
Level 2 & 3 Aligned