Organizations should prevent the release of nonpublic information on systems accessible to the public. Systems accessible to the public include websites and social media. Organizations should document authorizations for individuals permitted to post content on public systems. Organizations should document and follow two defined procedures related to this practice. One procedure should define steps for reviewing information before its release. Another should detail actions for removing nonpublic information when discovered.
This blog will discuss the following topics around 3.1.22:
In June 2015, NIST introduced special publication (SP) 800-171. NIST retained the identification number of 3.1.22 through the first and second revisions. NIST SP 800-171 Revision 3 has changed this requirement's number to 03.01.22.
The cybersecurity maturity model certification (CMMC) rule will verify SP 800-171 Rev 2. CMMC 1.02 numbered this practice AC.1.004 then AC.L1-3.1.22 under CMMC 2.0. This practice applies to organizations seeking compliance within any level of CMMC.
As of 12/22/23, CMMC 2.1 creates two numbers for this practice:
The level 1 practice defines nonpublic information as Federal Contract Information (FCI). The level 2 practice defines nonpublic information as Controlled Unclassified Information (CUI).
NIST derived seventy-nine security requirements from SP 800-53 Rev 4. Below is the original language from AC-22 within SP 800-53 Rev 4:
NIST abbreviated the language for 3.1.22 in SP 800-171 to:
NIST SP 800-171A provides assessment procedures for the corresponding SP 800-171 practices. These procedures apply assessment methods to assessment objects. Assessment methods include examination of artifacts, interviews of personnel, and tests of mechanisms. The assessor evaluates each part to produce a finding. A “satisfied” finding indicates an acceptable implementation result. A finding of “other than satisfied” indicates potential anomalies.
The assessment objectives for 3.1.22 contain five parts:
Appendix D within SP 800-171 maps security requirements to SP 800-53 Rev 4 controls. This mapping relates 3.1.22 to AC-22.
We mapped these five objectives to the closest SP 800-53A Rev 5 objectives. We used guidance from NIST IR 8477 to define the nature and strength of the relationships. The findings indicated that:
The 3.1.22 discussion draws on the supplemental guidance from AC-22.
NIST incorporates the highlighted text from AC-22 into the 3.1.22 discussion:
The last two sentences of the CMMC Assessment Guide discussion are new:
Organizations should identify individuals authorized to post FCI/CUI onto public systems. They should review the information before posting onto public systems. This review ensures that nonpublic information is not included.
The CMMC Assessment Guide also provides a practical guide for further discussion. This section simplifies the concept by including actionable steps:
Do not allow FCI/CUI to become public. Always safeguard the confidentiality of FCI/CUI. Control the posting of FCI/CUI on company-controlled websites or public forums. Control the exposure of FCI/CUI in public presentations or on public displays. Identify users allowed to publish information on systems accessible to the public. This includes your company website. Put in place a review process before posting such information. If discovered, have procedures to remove FCI/CUI and alert the appropriate parties.
The CMMC Assessment Guide also provides an example:
Your company decides to start issuing press releases about projects. Your company receives FCI/CUI from the government as part of its DoD contract. Recognize the need to manage controlled information. Meet with the employees who write the releases and post information. Establish a review process [c] before posting it on the company website [a,d]. Limit employee authorizations to post to the website [a].
The NIST SP 800-171 DoD Assessment Methodology Version 1.2.1 assigns a 1-point value to this practice. Failing to control content made public has a limited effect on data security. CMMC section 170.21(iii)(B) removes the eligibility of limited deficiency in this practice. This practice aligns with the basic cybersecurity safeguards requirements of 52.204-21.
Appendix C within NIST SP 800-53 Rev 5 discusses three implementation approaches:
NIST defines the implementation of the corresponding SP 800-53 controls as:
The crosswalk suggests that 3.1.22 requires a nontechnical implementation. The Defense Contract Management Agency (DCMA) published guidance for assessing SP 800-171. The DCMA Guide identifies documents as the relevant evidence for parts (a) and (b). Parts (c), (d) and (e) list artifacts as the relevant evidence. We concluded all parts of this practice are non-technical.
The scope focuses on the process of making information available to the public. This includes your website and social media accounts. This practice is unique because these are out-of-scope technology components. The relevant procedures likely include members of your marketing department.
Responsibility for this practice falls onto the organization seeking certification. The organization bears responsibility for preventing the disclosure of nonpublic information on public systems.
Let's start with part (a). Identify individuals authorized to post information to the website or social media accounts. Assessors will want to know the names of the authorized individuals. Create a list of users authorized to post content to systems accessible to the public.
Parts (b) and (c) look for an established procedure for posting information. This procedure may start with the individual creating a draft of content to publish. Part (C) instructs the procedure to include a review of this draft. Assign the review responsibility to an individual trained to identify FCI/CUI. Note that members of the marketing team may not receive this training.
FCI is information not releasable to the public. Organizations may receive or create FCI under a Federal contract. FCI does not include information provided by the Government to the public. This includes information on public websites or simple transactional information to process payments.
Controlled unclassified information (CUI) is a type of FCI. CUI includes information the Government creates or possesses. It also includes information an entity creates or possesses for the Government. CUI has governance permitting an agency to handle it using safeguarding controls. CUI does not include classified information. It excludes some information a nonfederal entity possesses in its systems. This exclusion applies to information that:
The Department of Defense has created free training on CUI. Organizations working in the defense industrial base should train employees to recognize CUI. Training should extend to individuals posting or reviewing content on public systems.
Part (d) ensures that the organization follows procedures when posting public information. Organizations should document these reviews to establish records of content reviews before publishing. Here is an example procedure for reviewing content published on public systems:
Part (e) establishes a procedure for removing nonpublic information when discovered. Here is an example procedure that may help address the first and last part of this practice:
Microsoft provides guidance that helps explain the potential steps for meeting these requirements. They acknowledge the need for documented policies and procedures. Configurations within Entra ID can enforce access permissions to nonpublic information.
Entra ID (Azure AD)
ATX Defense published similar instructions for Google Workspace. They also recommend developing a process around reviewing information before public release. They recommend defining a process to handle inadvertent disclosures of nonpublic information. Creating drive labels helps categorize nonpublic information within Google Drive. Using Workspace DLP can help prevent data loss.
Posting Content on the Organization’s Website and Social Media
Removing Nonpublic Information from the Website and Social Media
A continuous monitoring task verifies that controls produce the desired outcome(s). The practice 3.1.22 has two desired outcomes:
Organizations should review content on systems accessible to the public for nonpublic information. The FedRAMP Moderate baseline specifies a quarterly review [AC-22(d)]. Nonpublic information includes:
Other continuous monitoring activities may include:
NIST SP 800-171 Rev 3 aligns 03.01.22 with AC-22 from SP 800-53 Rev 5. There are only three parts to 03.01.22.
The crosswalk below shows the mapping of these requirements back to related parts of 3.1.22 from Revision 2:
Manage the risk of disclosing nonpublic information through your website and social media. Train employees posting and reviewing content on systems accessible to the public. Define and follow a process to review content before publication. Establish records associated with these reviews. Define a process to remove nonpublic information if discovered on public systems. Establish records associated with responses to nonpublic information discovered on public systems.