NIST SP 800-171 - National Institute of Standards and Technology Special Publication 800-171 Security and Privacy Controls for Federal Information Systems and Organizations

Summary

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800 series contains more than 200 documents designed to help US government agencies and private organizations secure information systems and data. Among them, the 800-171 provides recommended security requirements for protecting the confidentiality of Controlled Unclassified Information (CUI) governed by the Federal Acquisition Regulation (FAR) and Defense Federal Acquisition Regulation Supplement (DFARS).

Built-in compliance capabilities

Red Hat products have built-in capabilities that help you to align with the NIST SP 800-171 policy. By using integrations with the system management solutions available in our portfolio, you can align the configuration of the machine with the requirements. However, the result is not full compliance - you always need to review the results and take the context of your specific deployment into account.

Red Hat Enterprise Linux

You can install the system already pre-configured to NIST SP 800-171 by using RHEL image builder:

Note that this is integrated also in the Red Hat Insights, linked below.

If you prefer a kickstart-based installation, the method is described in the RHEL security guide:

You can build and deploy hardened bootable images pre-configured to NIST SP 800-171 for RHEL Image mode:

You can check the system configuration during runtime by using the OpenSCAP command-line tool:

Red Hat Satellite

You can plan and configure compliance policies, deploy the policies to hosts, and monitor the compliance of your hosts in Red Hat Satellite. For more information, see the product documentation:

Red Hat Insights for RHEL

You can create and manage your custom security policies entirely within the compliance service UI, as well as monitor the compliance state of your systems, remediate any discrepancies, and use the custom security policies in image builder to deploy additional systems:

Red Hat OpenShift

You can automate the inspection of numerous technical implementations and compare them against certain aspects of industry standards, benchmarks, and baselines.

Products in Scope

  • Red Hat Enterprise Linux
    • 8.3
    • 8.4
    • 8.5
    • 8.6
    • 8.7
    • 8.8
    • 8.9
    • 9

Additional Resources

Meta Data

Products

Red Hat Enterprise Linux

Regions

NA

Industries

Public Sector