Skip to content

NIST 800-171 Controls Matrix

A comprehensive breakdown of the 110 Controls across 14 Families required for safeguarding Controlled Unclassified Information (CUI).

ISO27001 Certification
ISO27001 Logo
TISAX ENX Certification
ISO9001 Certification
NIS2 Compliance
GDPR Compliance
TPISR Compliance
ISO27001 Certification
ISO27001 Logo
TISAX ENX Certification
ISO9001 Certification
NIS2 Compliance
GDPR Compliance
TPISR Compliance
3.1

Access Control

Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).

Controls22
3.2

Awareness and Training

Ensure that managers, systems administrators, and users of organizational information systems are made aware of the security risks associated with their activities.

Controls3
3.3

Audit and Accountability

Create, protect, and retain information system audit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized activity.

Controls9
3.4

Configuration Management

Establish and maintain baseline configurations and inventories of organizational information systems.

Controls9
3.5

Identification and Authentication

Identify information system users, processes acting on behalf of users, or devices and authenticate (or verify) the identities of those users, processes, or devices.

Controls11
3.6

Incident Response

Establish an operational incident-handling capability for organizational information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities.

Controls3
3.7

Maintenance

Perform maintenance on organizational information systems.

Controls6
3.8

Media Protection

Protect (i.e., physically control and securely store) information system media containing CUI, both paper and digital.

Controls9
3.9

Personnel Security

Screen individuals prior to authorizing access to information systems containing CUI.

Controls2
3.10

Physical Protection

Limit physical access to information systems, equipment, and the respective operating environments to authorized individuals.

Controls6
3.11

Risk Assessment

Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals.

Controls3
3.12

Security Assessment

Periodically assess the security controls in organizational information systems to determine if the controls are effective in their application.

Controls4
3.13

System and Communications Protection

Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.

Controls16
3.14

System and Information Integrity

Identify, report, and correct information and information system flaws in a timely manner.

Controls7

Need Help Implementing These 110 Controls?

We map these requirements directly to your existing workflows. Don't build a separate shadow IT system just for compliance.