{"id":31153,"date":"2021-02-03T17:27:30","date_gmt":"2021-02-03T17:27:30","guid":{"rendered":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/"},"modified":"2023-03-08T14:05:32","modified_gmt":"2023-03-08T14:05:32","slug":"nist-offers-tools-to-help-defend-against-state-sponsored-hackers","status":"publish","type":"post","link":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/","title":{"rendered":"NIST Offers Tools to Help Defend Against State-Sponsored Hackers"},"content":{"rendered":"
\n
\n
\n

Special Publication 800-172 is designed to protect sensitive information in a variety of electronic systems.<\/h2>\n<\/div>\n<\/div>\n<\/div>\n
\n
\n
\n
\n
\n

Nations around the world are adding cyberwarfare to their arsenal, employing highly skilled teams to launch attacks against other countries. These adversaries are also called the \u201cadvanced persistent threat,\u201d or APT, because they possess the tools and resources to pursue their objectives repeatedly over an extended period, adapting to defenders\u2019 efforts to resist them.<\/p>\n

Vulnerable data includes the sensitive but unclassified information managed by government, industry and academia in support of various federal programs. Now, a finalized publication from the National Institute of Standards and Technology (NIST) provides guidance to protect such \u201ccontrolled unclassified information\u201d (CUI) from the APT. NIST\u2019s Special Publication (SP) 800-172,\u00a0Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST SP 800-171<\/a>,<\/em>\u00a0offers a set of tools designed to counter the efforts of state-sponsored hackers and complements another NIST publication aimed at protecting CUI.<\/p>\n

\u201cCyberattacks are conducted with silent weapons, and in some situations those weapons are undetectable,\u201d said Ron Ross, a computer scientist and a NIST fellow. \u201cBecause you may not \u2018feel\u2019 the direct effects of the next hack yet, you may think it is coming someday down the road; but in reality, it\u2019s happening right now.\u201d<\/p>\n

The federal government relies heavily on nonfederal service providers to help carry out a wide range of missions using information systems \u2014 a term that includes computers, but also a range of other specialized technologies such as industrial control systems and the Internet of Things. The protection of sensitive federal information that resides in nonfederal systems \u2014 such as those used by state and local governments, colleges and universities, and independent research organizations \u2014 is of paramount importance, as it can directly impact the federal government\u2019s ability to carry out its operations. A\u00a0hack in 2018 that compromised sensitive information<\/a>\u00a0directly inspired the NIST team\u2019s work on SP 800-172.<\/p>\n

Formerly numbered SP 800-171B during its draft stages<\/a>, SP 800-172 offers additional recommendations for handling CUI in situations where that information runs a higher than usual risk of exposure. CUI includes a wide variety of information types, from individuals\u2019 names or Social Security numbers to critical defense information.<\/p>\n

\u201cWe developed SP 800-171 in response to major cyberattacks on U.S. critical infrastructure, and its companion document SP 800-172 is designed to mitigate attacks from advanced cyber threats such as the APT,\u201d Ross said. \u201cImplementing the cyber safeguards in SP 800-172 will help system owners protect what state-level hackers have considered to be particularly high-value targets: sensitive information about people, technologies, innovation and intellectual property, the revelation of which could compromise our economy and national security.\u201d<\/p>\n

The enhanced security requirements are to be implemented in addition to those in\u00a0SP 800-171<\/a>, since that publication is not designed to address the APT. The requirements in SP 800-172 apply to the components of nonfederal systems that process, store or transmit CUI or that provide protection for such components. To further narrow the scope, the requirements are applied only when the designated CUI is associated with a critical program or high-value asset \u2014 the highest priority for protection.<\/p>\n

Developed primarily for administrators such as program managers, CIOs and system auditors, the publication addresses the protection of CUI for system components by promoting penetration-resistant architecture, damage-limiting operations, and designs to achieve cyber resiliency and survivability. Its tools, divided into 14 families, are not intended to be implemented en masse, but selected according to the needs of the organization.<\/p>\n

\u201cMost likely an organization implementing this guidance will not want to use all of the enhanced security requirements we offer here,\u201d Ross said. \u201cThe decision to select a particular set of enhanced security requirements will be based on your mission and business needs \u2014 and then guided and informed by ongoing risk assessments.\u201d<\/p>\n

In response to feedback received during the public comment period, the final draft includes updated scoping and applicability guidance and a more flexible requirements selection approach to allow organizations to customize their security solutions.<\/p>\n

Ross said that the tools in the new publication should offer hope to anyone seeking to defend against hacks, even by as intimidating a threat as the APT.<\/p>\n

\u201cThe adversaries are bringing their \u2018A-game\u2019 in these cyberattacks 24 hours a day, 7 days a week,\u201d he said. \u201cYou can start making sure the damage is minimized if you use SP 800-172\u2019s cyber safeguards.\u201d<\/p>\n<\/div>\n<\/div>\n

 <\/p>\n

Original Source: https:\/\/www.nist.gov\/news-events\/news\/2021\/02\/nist-offers-tools-help-defend-against-state-sponsored-hackers<\/a><\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"Special Publication 800-172 is designed to protect sensitive information in a variety of electronic systems. Nations around the world are adding cyberwarfare to their arsenal, employing highly skilled teams to launch attacks against other countries. These adversaries are also called the \u201cadvanced persistent threat,\u201d or APT, because they possess the tools and resources to pursue […]","protected":false},"author":8,"featured_media":31154,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"acf":[],"yoast_head":"\nNIST Offers Tools to Help Defend Against State-Sponsored Hackers – DVIRC<\/title>\n<meta name=\"description\" content=\"Special Publication 800-172 is designed to protect sensitive information in a variety of electronic systems. Nations around the world are adding\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST Offers Tools to Help Defend Against State-Sponsored Hackers – DVIRC\" \/>\n<meta property=\"og:description\" content=\"Special Publication 800-172 is designed to protect sensitive information in a variety of electronic systems. Nations around the world are adding\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"DVIRC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dvirc.sepa\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-03T17:27:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-08T14:05:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/Myimagine_cyberworld_blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"sagan@brandllama.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DVIRC_PA\" \/>\n<meta name=\"twitter:site\" content=\"@DVIRC_PA\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sagan@brandllama.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/\"},\"author\":{\"name\":\"sagan@brandllama.com\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/person\/d3b9f6e4cb1d87a9e011f4bb4b4f31d1\"},\"headline\":\"NIST Offers Tools to Help Defend Against State-Sponsored Hackers\",\"datePublished\":\"2021-02-03T17:27:30+00:00\",\"dateModified\":\"2023-03-08T14:05:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/\"},\"wordCount\":747,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.dvirc.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/Myimagine_cyberworld_blog.jpg\",\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/\",\"url\":\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/\",\"name\":\"NIST Offers Tools to Help Defend Against State-Sponsored Hackers – DVIRC\",\"isPartOf\":{\"@id\":\"https:\/\/www.dvirc.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/Myimagine_cyberworld_blog.jpg\",\"datePublished\":\"2021-02-03T17:27:30+00:00\",\"dateModified\":\"2023-03-08T14:05:32+00:00\",\"description\":\"Special Publication 800-172 is designed to protect sensitive information in a variety of electronic systems. Nations around the world are adding\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#primaryimage\",\"url\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/Myimagine_cyberworld_blog.jpg\",\"contentUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/Myimagine_cyberworld_blog.jpg\",\"width\":850,\"height\":530},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dvirc.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIST Offers Tools to Help Defend Against State-Sponsored Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dvirc.org\/#website\",\"url\":\"https:\/\/www.dvirc.org\/\",\"name\":\"DVIRC\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.dvirc.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dvirc.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.dvirc.org\/#organization\",\"name\":\"DVIRC\",\"url\":\"https:\/\/www.dvirc.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg\",\"contentUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg\",\"width\":2560,\"height\":1671,\"caption\":\"DVIRC\"},\"image\":{\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dvirc.sepa\/\",\"https:\/\/twitter.com\/DVIRC_PA\",\"https:\/\/www.linkedin.com\/company\/dvirc\",\"https:\/\/www.youtube.com\/channel\/UChq_rqm2Lh3jDEg8m5ZRdrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/person\/d3b9f6e4cb1d87a9e011f4bb4b4f31d1\",\"name\":\"sagan@brandllama.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e0e1424cb9eeb7111a1146aa293c9ca6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e0e1424cb9eeb7111a1146aa293c9ca6?s=96&d=mm&r=g\",\"caption\":\"sagan@brandllama.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIST Offers Tools to Help Defend Against State-Sponsored Hackers – DVIRC","description":"Special Publication 800-172 is designed to protect sensitive information in a variety of electronic systems. Nations around the world are adding","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/","og_locale":"en_US","og_type":"article","og_title":"NIST Offers Tools to Help Defend Against State-Sponsored Hackers – DVIRC","og_description":"Special Publication 800-172 is designed to protect sensitive information in a variety of electronic systems. Nations around the world are adding","og_url":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/","og_site_name":"DVIRC","article_publisher":"https:\/\/www.facebook.com\/dvirc.sepa\/","article_published_time":"2021-02-03T17:27:30+00:00","article_modified_time":"2023-03-08T14:05:32+00:00","og_image":[{"width":850,"height":530,"url":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/Myimagine_cyberworld_blog.jpg","type":"image\/jpeg"}],"author":"sagan@brandllama.com","twitter_card":"summary_large_image","twitter_creator":"@DVIRC_PA","twitter_site":"@DVIRC_PA","twitter_misc":{"Written by":"sagan@brandllama.com","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#article","isPartOf":{"@id":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/"},"author":{"name":"sagan@brandllama.com","@id":"https:\/\/www.dvirc.org\/#\/schema\/person\/d3b9f6e4cb1d87a9e011f4bb4b4f31d1"},"headline":"NIST Offers Tools to Help Defend Against State-Sponsored Hackers","datePublished":"2021-02-03T17:27:30+00:00","dateModified":"2023-03-08T14:05:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/"},"wordCount":747,"commentCount":0,"publisher":{"@id":"https:\/\/www.dvirc.org\/#organization"},"image":{"@id":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/Myimagine_cyberworld_blog.jpg","inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/","url":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/","name":"NIST Offers Tools to Help Defend Against State-Sponsored Hackers – DVIRC","isPartOf":{"@id":"https:\/\/www.dvirc.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/Myimagine_cyberworld_blog.jpg","datePublished":"2021-02-03T17:27:30+00:00","dateModified":"2023-03-08T14:05:32+00:00","description":"Special Publication 800-172 is designed to protect sensitive information in a variety of electronic systems. Nations around the world are adding","breadcrumb":{"@id":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#primaryimage","url":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/Myimagine_cyberworld_blog.jpg","contentUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/Myimagine_cyberworld_blog.jpg","width":850,"height":530},{"@type":"BreadcrumbList","@id":"https:\/\/www.dvirc.org\/insights\/nist-offers-tools-to-help-defend-against-state-sponsored-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dvirc.org\/"},{"@type":"ListItem","position":2,"name":"NIST Offers Tools to Help Defend Against State-Sponsored Hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.dvirc.org\/#website","url":"https:\/\/www.dvirc.org\/","name":"DVIRC","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.dvirc.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dvirc.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.dvirc.org\/#organization","name":"DVIRC","url":"https:\/\/www.dvirc.org\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg","contentUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg","width":2560,"height":1671,"caption":"DVIRC"},"image":{"@id":"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dvirc.sepa\/","https:\/\/twitter.com\/DVIRC_PA","https:\/\/www.linkedin.com\/company\/dvirc","https:\/\/www.youtube.com\/channel\/UChq_rqm2Lh3jDEg8m5ZRdrg"]},{"@type":"Person","@id":"https:\/\/www.dvirc.org\/#\/schema\/person\/d3b9f6e4cb1d87a9e011f4bb4b4f31d1","name":"sagan@brandllama.com","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dvirc.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e0e1424cb9eeb7111a1146aa293c9ca6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e0e1424cb9eeb7111a1146aa293c9ca6?s=96&d=mm&r=g","caption":"sagan@brandllama.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/posts\/31153"}],"collection":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/comments?post=31153"}],"version-history":[{"count":0,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/posts\/31153\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/media\/31154"}],"wp:attachment":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/media?parent=31153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/categories?post=31153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}