3.13.2: Build Secure Systems by Design—Not as an Afterthought

Overview of NIST 800-171 Control 3.13.2

NIST 800-171 control 3.13.2 focuses on applying security engineering principles during system development and configuration. The intent is to ensure security is integrated into architecture, design decisions, and implementation practices rather than added late through reactive fixes. When systems handle Controlled Unclassified Information (CUI), design-stage decisions strongly influence long-term exposure, monitoring burden, and the likelihood of control failures.

For CMMC Level 2 scoping, this control is commonly demonstrated through repeatable engineering practices that reduce attack surface, constrain privilege, and ensure controls remain effective as systems evolve.

What the Control Requires

Control 3.13.2 expects organizations to use security engineering concepts when developing, integrating, and configuring systems. This typically includes establishing standards and processes that guide secure system design, selecting configurations that reduce risk, and validating that security assumptions remain true after deployment and change.

  • Security built into design: Architecture decisions reflect security objectives, trust boundaries, and intended control placements.
  • Secure implementation: Development and configuration follow defined standards that reduce vulnerabilities and misconfiguration risk.
  • Change-resilient controls: Updates and integrations are evaluated for security impact and verified after implementation.

Security Engineering Principles Commonly Applied

Security engineering principles are practical design rules that help prevent common failure modes. Organizations should select principles relevant to their environment and document how they are applied to systems in scope.

  • Least privilege: Limit permissions to what is necessary for roles, services, and integrations.
  • Separation of duties: Prevent a single individual or process from having unchecked end-to-end control over sensitive actions.
  • Defense in depth: Use layered safeguards so a single control failure does not result in compromise.
  • Secure defaults: Configure systems to a secure baseline, requiring deliberate action to reduce security.
  • Minimize attack surface: Remove unnecessary services, ports, software components, and execution paths.
  • Fail securely: Ensure error conditions do not grant access or expose sensitive information.

Practical Implementation in Real Environments

Organizations often meet 3.13.2 by combining documented engineering standards with technical enforcement and review checkpoints. The objective is to make secure design repeatable and verifiable.

  • Architecture and boundary definition: Maintain clear trust boundaries, data flows, and control placement decisions for in-scope environments.
  • Secure configuration baselines: Standardize hardening settings for operating systems, endpoints, network devices, and platforms.
  • Secure development practices: Use coding standards, dependency controls, and review processes to reduce vulnerabilities.
  • Threat-informed design reviews: Evaluate how adversaries could abuse interfaces, identities, or integrations and adjust designs accordingly.
  • Change impact evaluation: Assess security impact before changes and validate controls after changes are implemented.

Audit-Ready Engineering and Evidence Table

The table below shows audit-friendly examples of how security engineering is applied across the lifecycle, including required activities, expected outputs, and accountable roles.

Lifecycle Stage Security Engineering Activity Audit Evidence to Retain Accountable Role
Design Define trust boundaries, data flows, and control placement; apply least privilege and defense in depth Architecture diagrams, data flow descriptions, boundary definitions, security requirements System Owner / Architect
Build and Configure Implement secure defaults and hardening baselines; minimize exposed services and interfaces Configuration baselines, hardening standards, build checklists, baseline validation results IT Operations / Platform Engineering
Develop Apply secure coding standards and dependency controls; review for unsafe patterns and privileged actions Coding standards, review records, dependency inventories, remediation tickets Development Lead
Validate Verify controls operate as designed; confirm least privilege and segmentation assumptions remain true Test results, access validation outputs, segmentation evidence, exceptions with approvals Security Engineering
Change and Maintain Assess security impact of changes; re-validate baselines and control effectiveness after updates Change records, impact assessments, post-change validation notes, periodic review attestations Change Manager

Common Gaps to Avoid

  • Security added late: Controls bolted on after deployment, increasing complexity and leaving gaps in trust boundary design.
  • Undefined baselines: Inconsistent configurations across systems that increase misconfiguration and drift risk.
  • Weak privilege design: Overly broad admin roles, shared accounts, or service permissions that exceed operational need.
  • Unreviewed integrations: New connections, APIs, or tools introduced without a security impact assessment.
  • Evidence gaps: Security engineering performed informally without retained artifacts that demonstrate repeatability.

FAQ

What does NIST 800-171 control 3.13.2 require?

It requires organizations to apply security engineering principles when developing or configuring systems so security is built in from the start and maintained through change.

What are examples of security engineering principles for 3.13.2?

Common examples include least privilege, separation of duties, defense in depth, secure defaults, and minimizing the system attack surface.

What evidence supports 3.13.2 for CMMC Level 2?

Typical evidence includes architecture and data flow documentation, secure configuration standards, design and code review records, threat modeling outputs, and change control artifacts.

🍪 We Use Cookies

To enhance your experience and analyze site usage, we use cookies. By continuing to use our site, you agree to our use of cookies in accordance with our Privacy Policy.