Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfully conduct its essential missions and functions. This publication provides agencies with recommended security requirements for protecting the confidentiality of CUI when the information is resident in nonfederal systems and organizations; when the nonfederal organization is not collecting or maintaining information on behalf of a federal agency or using or operating a system on behalf of an agency; and where there are no specific safeguarding requirements for protecting the confidentiality of CUI prescribed by the authorizing law, regulation, or governmentwide policy for the CUI category listed in the CUI Registry. The requirements apply to all components of nonfederal systems and organizations that process, store, or transmit CUI, or that provide security protection for such components. The requirements are intended for use by federal agencies in contractual vehicles or other agreements established between those agencies and nonfederal organizations.

[1]  George Moore,et al.  Automation Support for Security Control Assessments: Volume 1: Overview , 2016 .

[2]  G. E. Dille Guidance , 1930 .

[3]  Sheila E. Frankel,et al.  Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .

[4]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[5]  Timothy Grance,et al.  Guide to Integrating Forensic Techniques into Incident Response , 2006 .

[6]  Richard Graubart,et al.  Systems Security Engineering: Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems , 2018 .

[7]  Elaine B. Barker,et al.  Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography , 2007 .

[8]  Joan Hash,et al.  Building an Information Technology Security Awareness and Training Program , 2003 .

[9]  Karen A. Scarfone,et al.  Guide to Malware Incident Prevention and Handling for Desktops and Laptops , 2013 .

[10]  Ronald S. Ross,et al.  Assessing Security Requirements for Controlled Unclassified Information , 2018 .

[11]  Karen A. Scarfone,et al.  Guide to Enterprise Patch Management Technologies , 2013 .

[12]  David L. Mills,et al.  Internet Engineering Task Force (ietf) Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010 .

[13]  John Wack,et al.  Guidelines on Firewalls and Firewall Policy , 2002 .

[14]  Ramaswamy Chandramouli Secure Virtual Network Configuration for Virtual Machine (VM) Protection , 2016 .

[15]  Ronald S. Ross,et al.  Guide for security-focused configuration management of information systems , 2011 .

[16]  K. Scarfone,et al.  Guidelines for Managing the Security of Mobile Devices in the Enterprise , 2013 .

[17]  Thomas J. Walsh,et al.  Security Considerations for Voice Over IP Systems , 2005 .

[18]  Wayne Jansen,et al.  Guidelines on Active Content and Mobile Code , 2008 .