Mastering The Fundamentals of NIST 800-171 Compliance
Protecting an organization's data and the systems that collect, process and maintain this data is of critical importance. Commensurate with risk, cybersecurity and privacy measures must be implemented to guard against unauthorized access to, alteration, disclosure or destruction of data and systems, applications and services. This also includes protection against accidental loss or destruction. The security of systems, applications and services must include controls and safeguards to offset possible threats, as well as controls to ensure confidentiality, integrity, availability and safety:
- CONFIDENTIALITY – This addresses preserving authorized restrictions on access and disclosure to authorized users and services, including means for protecting personal privacy and proprietary information.
- INTEGRITY – This addresses protecting against improper modification or destruction, including ensuring non-repudiation and authenticity.
- AVAILABILITY – This addresses timely, reliable access to data, systems and services for authorized users, services and processes.
- SAFETY – This addresses reducing risk associated with technologies that could fail or be manipulated by nefarious actors to cause death, injury, illness, damage to or loss of equipment.
Confidentiality, Integrity, Availability & Safety (CIAS) Model
Populating The CIAS Model
There are no products listed under this category.
-
NIST 800-171 R2 to R3 Transition Guide
Sooner, rather than later, the US Government's global supply chain will have to transition to NIST 8...
-
NIST 800-171 R3 Kill Chain
The CMMC 2.0 & NIST 800-171 R2 version of the CMMC Kill Chain introduces the theory of constrain...
-
NIST 800-171 R3 In A Nutshell
It is worthwhile to take a look at NIST 800-171 R3 through a People, Process, Technology, Data &...
-
NIST 800-171 R3
NIST 800-171 Rev 3 was released on 14 May of this year, and it contains significant changes from the...