
The NIST Gap Assessment Tool is a structured resource—typically a checklist, questionnaire, or software tool—used to evaluate an organization’s current cybersecurity or risk management posture against a specific NIST framework. The goal is to identify gaps between existing practices and the standards outlined by NIST, so organizations can plan and prioritize improvements.
The NIST SP 800-171 standard is primarily used by non-federal organizations—especially contractors and subcontractors—that handle Controlled Unclassified Information (CUI) on behalf of the U.S. federal government.
Specifically, it’s used by:
- Defense Contractors – working with the Department of Defense (DoD).
- Contractors/Subcontractors – serving other civilian federal agencies (e.g., DOE, DHS, GSA).
- Universities & Research Institutions – receiving federal research grants and handling CUI.
- IT Service Providers – managing federal data in cloud, software, or managed service environments.
- Manufacturers & Suppliers – in the Defense Industrial Base (DIB) who process CUI in any digital or physical format.
Why it matters:
Compliance with NIST 800-171 is required under DFARS 252.204-7012 for DoD contractors and is becoming a baseline for other federal supply chains. Organizations must implement the 110 security controls outlined in NIST 800-171 to protect the confidentiality of CUI.
✅ NIST 800-171 Compliance Checklist
1. Access Control (AC)
- Limit system access to authorized users.
- Separate duties of users to reduce risk.
- Control remote and internal access to CUI.
- Manage session timeout and lock settings.
2. Awareness & Training (AT)
- Train users on security risks and responsibilities.
- Provide CUI handling training.
- Update training regularly.
3. Audit & Accountability (AU)
- Generate audit logs for events.
- Protect audit logs from modification.
- Review and analyze logs regularly.
4. Configuration Management (CM)
- Establish baseline configurations.
- Control changes to systems.
- Implement least functionality principle.
5. Identification & Authentication (IA)
- Use unique IDs for users.
- Enforce strong password policies.
- Implement multifactor authentication.
6. Incident Response (IR)
- Establish an incident response plan.
- Detect, report, and track incidents.
- Conduct incident response training and testing.
7. Maintenance (MA)
- Perform system maintenance securely.
- Control and monitor maintenance tools and activities.
8. Media Protection (MP)
- Protect and label CUI on media.
- Sanitize or destroy media before disposal.
- Restrict media access and transfer.
9. Physical Protection (PE)
- Limit physical access to systems and facilities.
- Escort visitors and monitor physical areas.
- Protect physical entry points.
10. Personnel Security (PS)
- Screen individuals prior to system access.
- Ensure CUI access is revoked upon termination.
11. Risk Assessment (RA)
- Conduct regular risk assessments.
- Identify and evaluate vulnerabilities.
- Document risk mitigation strategies.
12. Security Assessment (CA)
- Develop and maintain security plans.
- Conduct periodic security assessments.
- Monitor and remediate control effectiveness.
13. System & Communications Protection (SC)
- Protect CUI during transmission.
- Separate system components handling CUI.
- Implement boundary protections (e.g., firewalls).
14. System & Information Integrity (SI)
- Monitor systems for malicious code.
- Apply security patches promptly.
- Report and correct flaws quickly.
The NIST Gap Assessment Toolkit will cost-effectively assess your organization against the NIST SP 800-171 standard. It will help you to:

- Understand the NIST SP 800-171 requirements for storing, processing, and transmitting CUI (Controlled Unclassified Information)
- Quickly identify your NIST SP 800-171 compliance gaps
- Plan and prioritise your NIST SP 800-171 project to ensure data handling meets U.S. DoD (Department of Defense) requirements
NIST 800-171: System Security Plan (SSP) Template & Workbook
InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services | Mergers and Acquisition Security