Skip to content

Blogs

NIST 800-171 Compliance for Higher Education

With the number of cyber security attacks ever increasing, regulatory requirements from the federal government are also increasing to match them. One of the central requirements is NIST 800-171. The National Institute of Standards and Technology (NIST) introduced NIST 800-171 as a list of cybersecurity controls to protect controlled and sensitive, but unclassified, government information handled by federal contractors and other organizations working with the US government.

Education Sector and cyber security compliance

In December 2020 Federal Student Aid Office within the US Department of Education issued a notice that put NIST 800-171 at the heart of its post-secondary education cyber security plans.

For departments carrying out research on behalf the US government, or receiving federal funding, for example as part of a NASA program, there is also a requirement to protect CUI (controlled unclassified information) and for those carrying out research for the US Department of Defense, there may be further requirements to comply with CMMC. NIST 800-171 is a fundamental part of version 2.0 of the CMMC the framework.

So, complying with NIST 800-171 is likely to be necessary for at least part of IT networks on (and possibly off) campus. For more about the NIST 800-171 controls and the requirements, visit our guide.

Security from compliance

But the key driver behind compliance should be to improve the security posture of your entire network and not just a tick box exercise, carried out just to meet requirements. Rather, carried out properly, compliance can be the route to a more secure network.

The fundamentals remain the same – you need to get the basics right and ensure your cyber hygiene is maintained, from keeping on top of patching, to identifying misconfigurations within your network, to minimize the critical vulnerabilities as part of a baseline protection.

But manually auditing every device in a network can be a time-consuming process, leading to sampling or infrequent audits.

That’s where Titania Nipper comes in.

It’s unique virtual modelling of individual devices allows it to ingest configurations files, either by accessing the device config files directly or through uploading them and then virtually modeling the device based off of the config, providing an assessment of any misconfigurations identified. The assessment can save up to three hours per device.These are then output into either a json file or an easy-to-read html report.

Titania Nipper can accurately and automatically determine compliance with NIST SP 800-171 (Rev 2) controls related to network devices. Our virtual modeling reduces false positives and identifies exact fixes to help you stay secure and compliant. Visit the NIST SP 800-171 solution page to find out more or request a trial today. 

 

Find out more about Nipper

Compliance Certifications