Download our FREE ebook on GDPR compliance. Download Now

NIST 800-53 Compliance Guide

Achieve NIST 800-53, Revision 5 compliance with Endpoint Protector by CoSoSys for Data Loss Prevention (DLP) and USB device control. As a federal agency or an organization operating under the authority of the US government, understanding the role of NIST 800-53, Revision 5, within your security operations is critical. Unfortunately, given its complexity, no one solution will fulfill all NIST 800-53, Revision 5 and NIST Cybersecurity Framework requirements for information security. Instead, federal agencies will need to combine multiple technologies and processes to meet their stated goals. This blog post outlines the security controls that can be achieved with Endpoint Protector, and is designed to help federal agencies in their evaluation of software solutions to achieve NIST 800-53, Revision 5 compliance. If you are a federal government contractor or supplier and have been asked to meet the requirements documented in the NIST 800-171, Revision 2 publication, or other NIST SP, visit our NIST Compliance page.

Navigating the NIST Framework

Understanding the hierarchy of NIST can, at first glance, appear complex. At its root, NIST 800-53 compliance, Revision 5, lays out security standards around five core NIST Framework ‘Functions:’ Identify, Protect, Detect, Respond, and Recover. These functions cover the basic requirements; from how an organization prepares its systems to identify risk, though to how it responds and recovers. Within these functions are 888 different controls that span both technology and processes. For ease, these controls are divided into 20 Control Families: Access Control, Configuration Management, Contingency Planning, Incident Response, Media Protection, Personnel Security, Physical and Environmental Protection, Program Management, Risk Assessment, Security Assessment and Authorization, System and Communications Protection, System and Information Integrity, Supply Chain Risk Management, and Privacy and Security Controls for Information Systems and Organizations.

Where can Endpoint Protector be applied?

Endpoint Protector provides particular support for the Protect and Detect functions by providing a range of endpoint protection tools, such as DLP, Device Control, and Enforced Encryption to achieve information security.

Five core functions of NIST 800-53, Revision 5:

  1. Identify (ID): Understand and manage cyber risk by identifying assets, vulnerabilities, threats, impacts, and risks to prioritize resources.
  2. Protect (PR): Implement security controls to reduce cyber risk, including technical, administrative, and physical controls as well as training and planning.
  3. Detect (DE): Detect and respond to cyberattacks by implementing monitoring and detection systems and procedures, and continuous security monitoring.
  4. Respond (RS): Respond to and contain cyber incidents by having incident response plans and procedures in place.
  5. Recover (RC): Restore normal operations after a cyber incident by having backup and recovery plans, disaster recovery, and business continuity planning in place.

Applying Endpoint Protector to the Protect (PR) and Detect (DE) Functions

Endpoint Protector can help your organization to meet multiple NIST 800-53, Revision 5 security requirements. In particular, helping you to control the use of removable media and protect against data leaks as part of an ongoing information security strategy. Within the Protect Function, Endpoint Protector offers particular support for the Data Security (DS) category. This is defined as, “Information and records (data) being managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information.” The following sub-categories and controls can be achieved partially/or in full by Endpoint Protector depending on organizational goals.

Category Data Security (DS)
Sub-Categories PR.DS-1: Data-at-rest is protected PR.PT-2: Removable media is protected
Control Family MP: Media Protection
Controls & Control Enhancements MP-7: Media Use MP-7 restricts the use of certain types of media on systems, for example, restricting or prohibiting the use of flash drives or external hard disk drives. Organizations may look to prohibit their use or limit the use of portable storage devices to only approved devices or certain user groups. Endpoint Protector’s Device Control solution allows organizations to manage the use of USB drives and other portable storage devices connected to employee endpoints, ensuring compliance with the NIST removable media policy.
Applied Baselines Low Moderate High Privacy
Endpoint Protector’s Application Endpoint Protector’s Device Control solution allows the organization to manage the use of USB drives, and other portable storage devices connected to employee endpoints. This includes USB Flash drives, external HDDs, SD Cards, and even storage media connected via Bluetooth (e.g. smartphones). Use of external storage media can be blocked at a company level, or controls put in place to allow access at group/team, or individual level. Permissions can also be assigned only to approved storage media (e.g. IT approved USB drives). File Shadowing functionality extends information security controls to your security program by allowing security administrators to monitor, and report on, all sensitive data transfers made to external storage at an individual employee level.
Threats Protected Tampering Information Disclosure
Category Data Security (DS)
Sub-Categories PR.DS-2: Data-in-transit is protected
Control Family System and Communications Protection
Controls & Control Enhancements SC-8: Protect the confidentiality of transmitted information & SC-8(1): Cryptographic Or Alternate Physical Protection. The information system implements cryptographic mechanisms to prevent unauthorized disclosure of information and/or detects changes during transmission unless otherwise protected by defined alternative physical safeguards.
Applied Baselines Low Moderate High Privacy
Endpoint Protector’s Application For organizations that require the use of portable media for the movement of data, Endpoint Protector’s Enforced Encryption functionality removes the need for specialist (and expensive) hardware-based solutions and instead applies AES 256bit encryption to files sent to any USB storage device approved for use by the organization.
Threats Protected Tampering Information Disclosure
Category Data Security (DS)
Sub-Categories PR.DS-5: Protections against data leaks are implemented
Control Family System and Communications Protection
Controls & Control Enhancements SC-7 Boundary Protection Monitor and control communications at external managed interfaces to the system and at key internal managed interfaces within the system.SC-7(10) Prevent Exfiltration: Prevent the exfiltration of information; and conduct exfiltration tests.
Applied Baselines Low Moderate High Privacy
Endpoint Protector’s Application Endpoint Protector Device Control and Content Aware Protection allow security teams to protect sensitive data from being exfiltrated at the employee endpoint (interface) in accordance with SC-7 and SC-7(10). This is sometimes referred to as “Insider Threats”. This spans potential exfiltration of data through hardware devices (e.g. USB drives, external HDDs, Bluetooth-connected devices, printers, and more); and also through software applications, e.g. email, Slack, file uploads, etc. Precise control over the exfiltration or transfer of documents can be achieved at a company, group/team, or individual level, and by the content type. Content-level controls can be built around defined confidential data (such as Personally Identifiable Information (PII) or Payment Card Information (PCI DSS)), or by custom policies to protect unique assets such as Intellectual Property (IP) or source code.
Threats Protected Information Disclosure
Category Data Security (DS)
Sub-Categories PR.DS-5: Protections against data leaks are implemented
Control Family System and Communications Protection
Controls & Control Enhancements SI-4 System Monitoring Strategically within the system, collect essential information to track specific types of transactions of interest to the organization; Monitor the system to detect: Attacks and indicators of potential attacks in accordance with monitoring objectives.SI-4(19): Risk for Individuals: (*not part of any baselines) Have the ability to monitor  individuals who have been identified as posing an increased level of risk
Applied Baselines Low Moderate High Privacy
Endpoint Protector’s Application Endpoint Protector can be configured for system monitoring at an individual endpoint/employee level to support SC-4 and SC-14(19). Passive monitoring can be achieved with log data to track the movement, and potential exfiltration attempt, of defined confidential data types. Proactive monitoring of individuals who present an increased risk (SC-14(19)), can be further enhanced with File Shadowing creating copies of all transferred files – allowing security administrators to inspect the exact contents of a file.
Threats Protected Information Disclosure

Within the Detect (DE) Function, Endpoint Protector offers particular support for the Security Continuous Monitoring and Anomalies and Events categories. Security Continuous Monitoring specifies that information systems and assets are monitored to discover and identify cybersecurity events and verify the effectiveness of protective measures. Anomalies and Events require that anomalous activity is detected and the potential impact of events is understood. In both cases, Endpoint Protector’s lightweight agent not only acts as the control point for enforcing policies but also as a mechanism to report on potentially harmful activity. The following sub-categories and controls can be achieved partially/or in full by Endpoint Protector depending on organizational goals.

Category Security Continuous Monitoring (CM)
Sub-Categories DE.CM-3 – Personnel activity is monitored to detect potential cybersecurity events. DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed. DE.AE-3: Anomalous activity is detected and the potential impact of events is understood.
Control Family Assessment, Authorization, and Monitoring
Controls & Control Enhancements CA-7 – Continuous Monitoring Develop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy
Applied Baselines Low Moderate High Privacy
Endpoint Protector’s Application Where Endpoint Protector is deployed on an endpoint, security administrators can report on attempted/blocked data transfers that breach documented data protection policies, even when the endpoint is offline and not connected to a network. Passive monitoring can be achieved with log data to track the movement, and potential exfiltration attempt, of defined confidential data types. Proactive monitoring of endpoints can be further enhanced with File Shadowing, creating copies of all transferred files – allowing security administrators to inspect the exact contents of a file.

What is Controlled Unclassified Information?

It’s important to understand the types of data that your organization will be handling. Both NIST 800-53, Revision 5 and NIST 800 171, Revision 2 cover Controlled Unclassified Information (CUI). Some examples of CUI include:

  1. Export-controlled information, such as technical data related to defense articles, software, and technology.
  2. Financial information, including tax return information, financial account numbers, credit reports, and other data covered by PCI-DSS.
  3. Law enforcement information, such as criminal investigations, sensitive security information, and intelligence information.
  4. Personal information, such as social security numbers, medical records, and PII.
  5. Controlled technology, including information related to nuclear facilities, biological agents, and chemical weapons.
  6. Transportation information, such as hazardous materials transportation information and transportation security information.
  7. Sensitive information related to government contracts, procurement, and acquisition.

These are just a few examples of the types of information that may be considered CUI. It’s important to note that the specific categories and definitions of CUI may vary depending on your organization, the federal information systems you are working within, and the regulatory framework involved. Fortunately, Endpoint Protector’s Content Aware Protection allows you to control and stop the exfiltration of any data type. For those looking to secure PII, Personal Healthcare Information (PHI), or payment card information, Endpoint Protector’s predefined libraries of data can help your security team quickly build templated policies. More advanced policies can also be built against IP, source code, or any other type of data, with policies tailored to different user groups and applied to different exit points on the employee endpoint.

Key considerations

  • Multi-OS – Endpoint Protector allows you to build policies to protect Windows, macOS, and Linux machines from a single admin console. This is vital for organizations that want to consolidate policy management and reduce the number of security platforms being maintained.
  • Protect offline activity – It’s important to remember that many cloud-based solutions don’t offer endpoint protection when the employee goes offline. This would be noted as a particular risk against a NIST compliance audit.
  • Minimal performance impact – As Endpoint Protector uses a lightweight agent, policies remain in place regardless of the endpoint’s connectivity status or employee location. Any attempted policy violation is reported back to your administrators when connectivity to the endpoint is restored.
  • Deployment – Endpoint Protector can be deployed in multiple ways to meet any existing security and data compliance requirements that your organization might have in place. This includes on-premise/virtual appliance or cloud-based (either within your own cloud service or hosted by us).
  • Organizations should look to understand the Control Baseline required to cover their systems by determining the criticality and sensitivity of the information to be processed, stored, or transmitted by those systems. Not all of the controls listed in this post apply to all Control Baseline requirements (e.g., low-impact, moderate-impact, and high-impact) as well as the privacy control baseline.

This article is for informational purposes only. The National Institute of Standards and Technology does not endorse any commercial products or companies. Organizations are solely responsible for determining the appropriateness of using Endpoint Protector to achieve their security requirements and NIST SP compliance.

explainer-c_compliant-industry

Download our free ebook on
GDPR compliance

A comprehensive guide for all businesses on how to ensure GDPR compliance and how Endpoint Protector DLP can help in the process.

In this article:

    Request Demo
    check mark

    Your request for Endpoint Protector was sent!
    One of our representatives will contact you shortly to schedule a demo.

    * Your privacy is important to us. Check out our Privacy Policy for more information.