What systems are in the bullseye of the NIST 800-171 compliance target? This task is all about zeroing in on the information systems that fall within the scope of your assessment. The impact is sizeable since understanding which systems need focus shapes the entire security analysis journey. If you're uncertain, think about the data handled by each system. The desired result is a clear list of systems to be evaluated. Challenges might include incomplete information or forgotten systems, but a thorough review with stakeholders can remedy this. You'll need network maps and data flow diagrams—get those ready!