Roadmap to NIST Compliance
Walker can help manufacturers comply with NIST 800-171.
What is NIST?
NIST (National Institute of Standards and Technology) is an organization within the U.S. Department of Commerce. Within NIST are several departments (known as laboratories) that focus on conducting research and creating standards within their respective disciplines. One laboratory is dedicated towards creating standards for information technology. The information technology laboratory created the NIST 800-171 standard with which you are being asked by your client to comply.
Why should you care?
NIST 800-171 pertains to the protection of Controlled Unclassified Information (CUI). If an organization you supply has provided you with CUI (ex: government or military drawings), they’ll require that you comply with NIST 800-171 to ensure proper measures are taken to protect this information from being compromised by individuals both inside and outside of your organization.
Consequences of not complying with NIST
Consequences can include losing a contract with a client and limiting your opportunities to bid on future contracts.
What steps must be taken to become NIST Compliant?
Step 1: Schedule an IT Security Assessment
with Walker, an expert in NIST compliance.
Step 2:
Walker will assess your systems and compare them to the standards set forth by NIST 800-171.
Step 3:
Walker will provide a written report summarizing how your organization complies with each section of NIST 800-171 and provide system upgrade recommendations for becoming fully compliant.
Step 4:
Provide your client with Walker’s report along with a timeline for completing Walker’s recommendations and becoming fully compliant.
Step 5:
Begin implementing Walker’s recommendations and meet all milestones set forth in your timeline
How often should we conduct a NIST Assessment?
NIST Assessments should be completed annually. An annual frequency is recommended because NIST’s standards
and your IT infrastructure will evolve over time.
How can I get in contact with Walker?
Current Walker clients should contact their Account Managers and new clients can submit a Contact Us
request.
WE ARE PROUD TO BE
More Recent News

The Evolution of Passwords: From Simple Words to Complex Security Protocols In the early days of computing, passwords were an afterthought—just simple words that served as keys to unlock access to systems. “Password” itself was once a common password. It sounds laughable today, but security threats were far less prevalent or sophisticated decades ago. As the internet exploded and cyber threats multiplied, the need for stronger, more complex passwords—and layered security practices—became undeniable.