There are three main controls within NIST 800-171's security assessment requirements. First, organizations must regularly conduct assessments, as mandated by AU-12. This ensures ongoing monitoring for vulnerabilities. Second, AU-13 requires using various assessment techniques. These can include penetration testing, which simulates cyberattacks, vulnerability scanning to find weaknesses in systems, and code reviews to identify flaws in software. Finally, AU-14 dictates that the findings from these assessments are reported to designated officials. This ensures appropriate action is taken to address any security risks discovered.
By following these NIST 800-171 security assessment requirements, organizations can proactively identify and address security weaknesses in their systems. This helps maintain a strong security posture and reduce the risk of cyberattacks.