How to protect controlled unclassified information

WWT offers a comprehensive assessment that provides a formal approach to determining how well an organization is aligned to compliance as defined by the federal standard Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations (NIST 800-171). With a deadline of December 31, 2017, rapidly approaching, organizations need to align compliance activities to address potential gaps in a rapid and efficient manner. The WWT assessment team identifies NIST requirements that pertain to the business; analyzes current operations supporting the standard; and provides a report of sufficiency of current efforts and recommendations for NIST alignment. The report audience includes executives, business unit owners and operational managers.

Objectives

Assessment objectives include:

  • An evaluation of NIST 800-171 compliance requirements per the tailoring criteria provided in the standard
  • An assessment of implemented technologies and operational processes as they pertain to the NIST 800-171 standard
  • Determination if potential gaps exist between NIST requirements and operational processes and technologies within the organization
  • A summary of the overall maturity level of NIST 800-171 compliance alignment
  • If compliance gaps exist, detailed recommendations are provided for remediation and alignment to the NIST 800-171 controls

The approach used for this assessment, which includes a clearly defined methodology and set of deliverables, provides a standardized and repeatable framework for periodic reassessment of compliance progress and program maturity. Recommendations are created according to business needs and resource availability, leveraging current technologies and program management capabilities within the business environment to achieve compliance.

Benefits

The WWT NIST 800-171 Compliance Assessment allows our customers to gain a comprehensive understanding of their compliance requirements and potential gaps between current operations and the NIST standard. Our team aligns potential control gap recommendations to the needs and capabilities within our customers’ business environments. This allows a simplified and clear path to achieving compliance in the shortest time possible.

View our NIST 800-171 Compliance Assessment brochure.

  • WWT & Syncurity Patch Management Overview

    WWT and the Syncurity IR-FlowSOAR platform solve the patch management challenge with a comprehensive solution that delivers rapid response and reduced cyber risk.
  • Business Insight Support System Overview

    Software tools that deal with network security can run on many disparate applications. WWT developed a Business Insight Support System that ties output from software solutions into one web-based portal, functioning as a single touch point for all network security data.
  • Host-based Segmentation Pilot

    Implement segmentation protection with a host-based pilot capability and demonstrate success in 90 days.
  • Integrated Endpoint Security Architecture Federal Overview

    For most organizations, the ability to demonstrate compliance to an assessment program directly correlates to the maturity of their cyber security program. Learn more about WWT’s approach to integrated endpoint security architecture for our federal customers.
  • Integrated Endpoint Security Architecture Commercial Overview

    Endpoint security must be part of an overall security architecture and strategy. If all the areas referenced in this paper are addressed and integrated within an environment, the result will be a level of protection that far exceeds anything a single point product can provide.
  • Professional Services Security Overview

    Our Professional Services architects can help to overcome the challenges of securing an organization’s infrastructure through network discovery, a security assessment and penetration testing.
  • Splunk Appliance for IT Operational Intelligence

    Through operational intelligence, Splunk helps organizations detect potential problems and decrease response time to meet DCOI compliance.
  • Identity and Access Management

    Organizations understand that providing users with secure access can be challenging and strenuous. Identity and Access Management (IAM) is an enterprise program that focuses on ensuring that authorized people and devices have the appropriate access at the right time.
  • WWT Security Practice

    Explore WWT's approach to defending against cyber threats.
  • HIPAA Security Assessment

    This assessment presents an organization with actionable data to strengthen areas, mature processes, bring attention to compliance issues, and provide recommendations for remediation efforts.
  • SOC Assessment

    WWT's Security Operations Center (SOC) Assessment will assess each of the foundation-level elements of people, process, and technology to identify your organization’s overall strengths and weaknesses, current maturity ratings, and provide recommendations for improvement.
  • Issues in Cloud Security

    This white paper discusses the major computer security issues confronting an organization when moving to the cloud.