NIST SP 800-171 Rev 3
NIST SP 800-171 Rev 3 (May 2024). Restructured requirements for CUI protection. Note CMMC 2.0 still references Rev 2.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (34)
03.01 AC (Access Control)
| Code | Title |
|---|---|
| 03.01.01 | Account Management |
| 03.01.02 | Access Enforcement |
| 03.01.03 | Information Flow Enforcement |
| 03.01.04 | Separation of Duties |
| 03.01.05 | Least Privilege |
| 03.01.06 | Least Privilege - Privileged Accounts |
| 03.01.07 | Least Privilege - Privileged Functions |
| 03.01.08 | Unsuccessful Logon Attempts |
| 03.01.09 | System Use Notification |
| 03.01.10 | Device Lock |
| 03.01.11 | Session Termination |
| 03.01.12 | Remote Access |
| 03.01.16 | Wireless Access |
| 03.01.18 | Access Control for Mobile Devices |
| 03.01.20 | Use of External Systems |
| 03.01.22 | Publicly Accessible Content |
03.02 AT (Awareness and Training)
| Code | Title |
|---|---|
| 03.02.01 | Literacy Training and Awareness |
| 03.02.02 | Role-Based Training |
03.03 AU (Audit and Accountability)
| Code | Title |
|---|---|
| 03.03.01 | Event Logging |
| 03.03.02 | Audit Record Content |
| 03.03.03 | Audit Record Generation |
| 03.03.04 | Response to Audit Logging Process Failures |
| 03.03.05 | Audit Record Review, Analysis, and Reporting |
| 03.03.06 | Audit Record Reduction and Report Generation |
| 03.03.07 | Time Stamps |
| 03.03.08 | Protection of Audit Information |
03.04 CM (Configuration Management)
| Code | Title |
|---|---|
| 03.04.01 | Baseline Configuration |
| 03.04.02 | Configuration Settings |
| 03.04.03 | Configuration Change Control |
| 03.04.04 | Impact Analyses |
| 03.04.05 | Access Restrictions for Change |
| 03.04.06 | Least Functionality |
| 03.04.08 | Authorized Software - Allow by Exception |
| 03.04.10 | System Component Inventory |
| 03.04.11 | Information Location |
| 03.04.12 | System and Component Configuration for High-Risk Areas |
03.05 IA (Identification and Authentication)
| Code | Title |
|---|---|
| 03.05.01 | User Identification and Authentication |
| 03.05.02 | Device Identification and Authentication |
| 03.05.03 | Multi-Factor Authentication |
| 03.05.04 | Replay-Resistant Authentication |
| 03.05.05 | Identifier Management |
| 03.05.07 | Password Management |
| 03.05.11 | Authentication Feedback |
| 03.05.12 | Authenticator Management |
03.06 IR (Incident Response)
| Code | Title |
|---|---|
| 03.06.01 | Incident Handling |
| 03.06.02 | Incident Monitoring, Reporting, and Response Assistance |
| 03.06.03 | Incident Response Testing |
| 03.06.04 | Incident Response Training |
| 03.06.05 | Incident Response Plan |
03.07 MA (Maintenance)
| Code | Title |
|---|---|
| 03.07.04 | Maintenance Tools |
| 03.07.05 | Nonlocal Maintenance |
| 03.07.06 | Maintenance Personnel |
03.08 MP (Media Protection)
| Code | Title |
|---|---|
| 03.08.01 | Media Storage |
| 03.08.02 | Media Access |
| 03.08.03 | Media Sanitization |
| 03.08.04 | Media Marking |
| 03.08.05 | Media Transport |
| 03.08.07 | Media Use |
| 03.08.09 | System Backup - Cryptographic Protection |
03.09 PS (Personnel Security)
| Code | Title |
|---|---|
| 03.09.01 | Personnel Screening |
| 03.09.02 | Personnel Termination and Transfer |
03.10 PE (Physical Protection)
| Code | Title |
|---|---|
| 03.10.01 | Physical Access Authorizations |
| 03.10.02 | Monitoring Physical Access |
| 03.10.06 | Alternate Work Site |
| 03.10.07 | Physical Access Control |
| 03.10.08 | Access Control for Transmission |
03.11 RA (Risk Assessment)
| Code | Title |
|---|---|
| 03.11.01 | Risk Assessment |
| 03.11.02 | Vulnerability Monitoring and Scanning |
| 03.11.04 | Risk Response |
03.12 CA (Security Assessment and Monitoring)
| Code | Title |
|---|---|
| 03.12.01 | Security Assessment |
| 03.12.02 | Plan of Action and Milestones |
| 03.12.03 | Continuous Monitoring |
| 03.12.05 | Information Exchange |
03.13 SC (System and Communications Protection)
| Code | Title |
|---|---|
| 03.13.01 | Boundary Protection |
| 03.13.04 | Information in Shared System Resources |
| 03.13.06 | Network Communications - Deny by Default - Allow by Exception |
| 03.13.08 | Transmission Confidentiality and Integrity |
| 03.13.09 | Network Disconnect |
| 03.13.10 | Cryptographic Key Establishment and Management |
| 03.13.11 | Cryptographic Protection |
| 03.13.12 | Collaborative Computing Devices and Applications |
| 03.13.13 | Mobile Code |
| 03.13.15 | Session Authenticity |
03.14 SI (System and Information Integrity)
| Code | Title |
|---|---|
| 03.14.01 | Flaw Remediation |
| 03.14.02 | Malicious Code Protection |
| 03.14.03 | Security Alerts, Advisories, and Directives |
| 03.14.06 | System Monitoring |
| 03.14.08 | Information Management and Retention |
03.15 PL (Planning)
| Code | Title |
|---|---|
| 03.15.01 | Policy and Procedures |
| 03.15.02 | System Security Plan |
| 03.15.03 | Rules of Behavior |
03.16 SA (System and Services Acquisition)
| Code | Title |
|---|---|
| 03.16.01 | Security Engineering Principles |
| 03.16.02 | Unsupported System Components |
| 03.16.03 | External System Services |
03.17 SR (Supply Chain Risk Management)
| Code | Title |
|---|---|
| 03.17.01 | Supply Chain Risk Management Plan |
| 03.17.02 | Acquisition Strategies, Tools, and Methods |
| 03.17.03 | Supply Chain Requirements and Processes |
Access Control 03.01
| Code | Title |
|---|---|
| 03.01.01 | Account Management |
| 03.01.02 | Access Enforcement |
| 03.01.03 | Information Flow Enforcement |
| 03.01.04 | Separation of Duties |
| 03.01.05 | Least Privilege |
| 03.01.06 | Least Privilege - Privileged Accounts |
| 03.01.07 | Least Privilege - Privileged Functions |
| 03.01.08 | Unsuccessful Logon Attempts |
| 03.01.09 | System Use Notification |
| 03.01.10 | Device Lock |
| 03.01.11 | Session Termination |
| 03.01.12 | Remote Access |
| 03.01.16 | Wireless Access |
| 03.01.18 | Access Control for Mobile Devices |
| 03.01.20 | Use of External Systems |
| 03.01.22 | Publicly Accessible Content |
Audit Accountability 03.03
| Code | Title |
|---|---|
| 03.03.01 | Event Logging |
| 03.03.02 | Audit Record Content |
| 03.03.03 | Audit Record Generation |
| 03.03.04 | Response to Audit Logging Process Failures |
| 03.03.05 | Audit Record Review, Analysis, and Reporting |
| 03.03.06 | Audit Record Reduction and Report Generation |
| 03.03.07 | Time Stamps |
| 03.03.08 | Protection of Audit Information |
Awareness Training 03.02
| Code | Title |
|---|---|
| 03.02.01 | Literacy Training and Awareness |
| 03.02.02 | Role-Based Training |
Configuration Mgmt 03.04
| Code | Title |
|---|---|
| 03.04.01 | Baseline Configuration |
| 03.04.02 | Configuration Settings |
| 03.04.03 | Configuration Change Control |
| 03.04.04 | Impact Analyses |
| 03.04.05 | Access Restrictions for Change |
| 03.04.06 | Least Functionality |
| 03.04.08 | Authorized Software - Allow by Exception |
| 03.04.10 | System Component Inventory |
| 03.04.11 | Information Location |
| 03.04.12 | System and Component Configuration for High-Risk Areas |
Identification Authentication 03.05
| Code | Title |
|---|---|
| 03.05.01 | User Identification and Authentication |
| 03.05.02 | Device Identification and Authentication |
| 03.05.03 | Multi-Factor Authentication |
| 03.05.04 | Replay-Resistant Authentication |
| 03.05.05 | Identifier Management |
| 03.05.07 | Password Management |
| 03.05.11 | Authentication Feedback |
| 03.05.12 | Authenticator Management |
Incident Response 03.06
| Code | Title |
|---|---|
| 03.06.01 | Incident Handling |
| 03.06.02 | Incident Monitoring, Reporting, and Response Assistance |
| 03.06.03 | Incident Response Testing |
| 03.06.04 | Incident Response Training |
| 03.06.05 | Incident Response Plan |
Maintenance 03.07
| Code | Title |
|---|---|
| 03.07.04 | Maintenance Tools |
| 03.07.05 | Nonlocal Maintenance |
| 03.07.06 | Maintenance Personnel |
Media Protection 03.08
| Code | Title |
|---|---|
| 03.08.01 | Media Storage |
| 03.08.02 | Media Access |
| 03.08.03 | Media Sanitization |
| 03.08.04 | Media Marking |
| 03.08.05 | Media Transport |
| 03.08.07 | Media Use |
| 03.08.09 | System Backup - Cryptographic Protection |
Personnel Security 03.09
| Code | Title |
|---|---|
| 03.09.01 | Personnel Screening |
| 03.09.02 | Personnel Termination and Transfer |
Physical Protection 03.10
| Code | Title |
|---|---|
| 03.10.01 | Physical Access Authorizations |
| 03.10.02 | Monitoring Physical Access |
| 03.10.06 | Alternate Work Site |
| 03.10.07 | Physical Access Control |
| 03.10.08 | Access Control for Transmission |
Planning 03.15
| Code | Title |
|---|---|
| 03.15.01 | Policy and Procedures |
| 03.15.02 | System Security Plan |
| 03.15.03 | Rules of Behavior |
Risk Assessment 03.11
| Code | Title |
|---|---|
| 03.11.01 | Risk Assessment |
| 03.11.02 | Vulnerability Monitoring and Scanning |
| 03.11.04 | Risk Response |
Security Assessment 03.12
| Code | Title |
|---|---|
| 03.12.01 | Security Assessment |
| 03.12.02 | Plan of Action and Milestones |
| 03.12.03 | Continuous Monitoring |
| 03.12.05 | Information Exchange |
Supply Chain Risk Mgmt 03.17
| Code | Title |
|---|---|
| 03.17.01 | Supply Chain Risk Management Plan |
| 03.17.02 | Acquisition Strategies, Tools, and Methods |
| 03.17.03 | Supply Chain Requirements and Processes |
System Communications Protection 03.13
| Code | Title |
|---|---|
| 03.13.01 | Boundary Protection |
| 03.13.04 | Information in Shared System Resources |
| 03.13.06 | Network Communications - Deny by Default - Allow by Exception |
| 03.13.08 | Transmission Confidentiality and Integrity |
| 03.13.09 | Network Disconnect |
| 03.13.10 | Cryptographic Key Establishment and Management |
| 03.13.11 | Cryptographic Protection |
| 03.13.12 | Collaborative Computing Devices and Applications |
| 03.13.13 | Mobile Code |
| 03.13.15 | Session Authenticity |
System Information Integrity 03.14
| Code | Title |
|---|---|
| 03.14.01 | Flaw Remediation |
| 03.14.02 | Malicious Code Protection |
| 03.14.03 | Security Alerts, Advisories, and Directives |
| 03.14.06 | System Monitoring |
| 03.14.08 | Information Management and Retention |
System Services Acquisition 03.16
| Code | Title |
|---|---|
| 03.16.01 | Security Engineering Principles |
| 03.16.02 | Unsupported System Components |
| 03.16.03 | External System Services |
Frequently Asked Questions
What is NIST SP 800-171 Rev 3?
NIST SP 800-171 Rev 3 is a compliance framework from United States with 34 domains and 194 controls. NIST SP 800-171 Rev 3 (May 2024). Restructured requirements for CUI protection. Note CMMC 2.0 still references Rev 2. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does NIST SP 800-171 Rev 3 have?
NIST SP 800-171 Rev 3 has 194 controls organised across 34 domains. The largest domains are 03.01 AC (Access Control) (16 controls), Access Control 03.01 (16 controls), 03.04 CM (Configuration Management) (10 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does NIST SP 800-171 Rev 3 map to?
NIST SP 800-171 Rev 3 does not currently have cross-framework mappings in our system. Check back as we continuously expand our mapping database.
How do I get started with NIST SP 800-171 Rev 3 compliance?
Start your NIST SP 800-171 Rev 3 compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about NIST SP 800-171 Rev 3 requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 194 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 769 frameworks.
Get Started Free →Free forever — no credit card required