Post

NIST SP 800-53 (rev. 4)

[toc]


NIST special publication 800-53 (rev. 4)

security and privacy controls for federal information systems and organizations

high impact controls

showing 170 controls:

no.control prioritylow moderatehigh
ac-1access control policy and procedures p1 ac-1 ac-1 ac-1  
ac-2account management p1 ac-2 ac-2 (1) (2) (3) (4) ac-2 (1) (2) (3) (4) (5) (11) (12) (13)  
ac-3access enforcement p1 ac-3 ac-3 ac-3  
ac-4information flow enforcement p1 ac-4 ac-4  
ac-5separation of duties p1 ac-5 ac-5  
ac-6least privilege p1 ac-6 (1) (2) (5) (9) (10) ac-6 (1) (2) (3) (5) (9) (10)  
ac-7unsuccessful logon attempts p2 ac-7 ac-7 ac-7  
ac-8system use notification p1 ac-8 ac-8 ac-8  
ac-10concurrent session control p3 ac-10  
ac-11session lock p3 ac-11 (1) ac-11 (1)  
ac-12session termination p2 ac-12 ac-12  
ac-14permitted actions without identification or authentication p3 ac-14 ac-14 ac-14  
ac-17remote access p1 ac-17 ac-17 (1) (2) (3) (4) ac-17 (1) (2) (3) (4)  
ac-18wireless access p1 ac-18 ac-18 (1) ac-18 (1) (4) (5)  
ac-19access control for mobile devices p1 ac-19 ac-19 (5) ac-19 (5)  
ac-20use of external information systems p1 ac-20 ac-20 (1) (2) ac-20 (1) (2)  
ac-21information sharing p2 ac-21 ac-21  
ac-22publicly accessible content p3 ac-22 ac-22 ac-22  
at-1security awareness and training policy and procedures p1 at-1 at-1 at-1  
at-2security awareness training p1 at-2 at-2 (2) at-2 (2)  
at-3role-based security training p1 at-3 at-3 at-3  
at-4security training records p3 at-4 at-4 at-4  
au-1audit and accountability policy and procedures p1 au-1 au-1 au-1  
au-2audit events p1 au-2 au-2 (3) au-2 (3)  
au-3content of audit records p1 au-3 au-3 (1) au-3 (1) (2)  
au-4audit storage capacity p1 au-4 au-4 au-4  
au-5response to audit processing failures p1 au-5 au-5 au-5 (1) (2)  
au-6audit review, analysis, and reporting p1 au-6 au-6 (1) (3) au-6 (1) (3) (5) (6)  
au-7audit reduction and report generation p2 au-7 (1) au-7 (1)  
au-8time stamps p1 au-8 au-8 (1) au-8 (1)  
au-9protection of audit information p1 au-9 au-9 (4) au-9 (2) (3) (4)  
au-10non-repudiation p2 au-10  
au-11audit record retention p3 au-11 au-11 au-11  
au-12audit generation p1 au-12 au-12 au-12 (1) (3)  
ca-1security assessment and authorization policy and procedures p1 ca-1 ca-1 ca-1  
ca-2security assessments p2 ca-2 ca-2 (1) ca-2 (1) (2)  
ca-3system interconnections p1 ca-3 ca-3 (5) ca-3 (5)  
ca-5plan of action and milestones p3 ca-5 ca-5 ca-5  
ca-6security authorization p2 ca-6 ca-6 ca-6  
ca-7continuous monitoring p2 ca-7 ca-7 (1) ca-7 (1)  
ca-8penetration testing p2 ca-8  
ca-9internal system connections p2 ca-9 ca-9 ca-9  
cm-1configuration management policy and procedures p1 cm-1 cm-1 cm-1  
cm-2baseline configuration p1 cm-2 cm-2 (1) (3) (7) cm-2 (1) (2) (3) (7)  
cm-3configuration change control p1 cm-3 (2) cm-3 (1) (2)  
cm-4security impact analysis p2 cm-4 cm-4 cm-4 (1)  
cm-5access restrictions for change p1 cm-5 cm-5 (1) (2) (3)  
cm-6configuration settings p1 cm-6 cm-6 cm-6 (1) (2)  
cm-7least functionality p1 cm-7 cm-7 (1) (2) (4) cm-7 (1) (2) (5)  
cm-8information system component inventory p1 cm-8 cm-8 (1) (3) (5) cm-8 (1) (2) (3) (4) (5)  
cm-9configuration management plan p1 cm-9 cm-9  
cm-10software usage restrictions p2 cm-10 cm-10 cm-10  
cm-11user-installed software p1 cm-11 cm-11 cm-11  
cp-1contingency planning policy and procedures p1 cp-1 cp-1 cp-1  
cp-2contingency plan p1 cp-2 cp-2 (1) (3) (8) cp-2 (1) (2) (3) (4) (5) (8)  
cp-3contingency training p2 cp-3 cp-3 cp-3 (1)  
cp-4contingency plan testing p2 cp-4 cp-4 (1) cp-4 (1) (2)  
cp-6alternate storage site p1 cp-6 (1) (3) cp-6 (1) (2) (3)  
cp-7alternate processing site p1 cp-7 (1) (2) (3) cp-7 (1) (2) (3) (4)  
cp-8telecommunications services p1 cp-8 (1) (2) cp-8 (1) (2) (3) (4)  
cp-9information system backup p1 cp-9 cp-9 (1) cp-9 (1) (2) (3) (5)  
cp-10information system recovery and reconstitution p1 cp-10 cp-10 (2) cp-10 (2) (4)  
ia-1identification and authentication policy and procedures p1 ia-1 ia-1 ia-1  
ia-2identification and authentication (organizational users) p1 ia-2 (1) (12) ia-2 (1) (2) (3) (8) (11) (12) ia-2 (1) (2) (3) (4) (8) (9) (11) (12)  
ia-3device identification and authentication p1 ia-3 ia-3  
ia-4identifier management p1 ia-4 ia-4 ia-4  
ia-5authenticator management p1 ia-5 (1) (11) ia-5 (1) (2) (3) (11) ia-5 (1) (2) (3) (11)  
ia-6authenticator feedback p2 ia-6 ia-6 ia-6  
ia-7cryptographic module authentication p1 ia-7 ia-7 ia-7  
ia-8identification and authentication (non-organizational users) p1 ia-8 (1) (2) (3) (4) ia-8 (1) (2) (3) (4) ia-8 (1) (2) (3) (4)  
ir-1incident response policy and procedures p1 ir-1 ir-1 ir-1  
ir-2incident response training p2 ir-2 ir-2 ir-2 (1) (2)  
ir-3incident response testing p2 ir-3 (2) ir-3 (2)  
ir-4incident handling p1 ir-4 ir-4 (1) ir-4 (1) (4)  
ir-5incident monitoring p1 ir-5 ir-5 ir-5 (1)  
ir-6incident reporting p1 ir-6 ir-6 (1) ir-6 (1)  
ir-7incident response assistance p2 ir-7 ir-7 (1) ir-7 (1)  
ir-8incident response plan p1 ir-8 ir-8 ir-8  
ma-1system maintenance policy and procedures p1 ma-1 ma-1 ma-1  
ma-2controlled maintenance p2 ma-2 ma-2 ma-2 (2)  
ma-3maintenance tools p3 ma-3 (1) (2) ma-3 (1) (2) (3)  
ma-4nonlocal maintenance p2 ma-4 ma-4 (2) ma-4 (2) (3)  
ma-5maintenance personnel p2 ma-5 ma-5 ma-5 (1)  
ma-6timely maintenance p2 ma-6 ma-6  
mp-1media protection policy and procedures p1 mp-1 mp-1 mp-1  
mp-2media access p1 mp-2 mp-2 mp-2  
mp-3media marking p2 mp-3 mp-3  
mp-4media storage p1 mp-4 mp-4  
mp-5media transport p1 mp-5 (4) mp-5 (4)  
mp-6media sanitization p1 mp-6 mp-6 mp-6 (1) (2) (3)  
mp-7media use p1 mp-7 mp-7 (1) mp-7 (1)  
pe-1physical and environmental protection policy and procedures p1 pe-1 pe-1 pe-1  
pe-2physical access authorizations p1 pe-2 pe-2 pe-2  
pe-3physical access control p1 pe-3 pe-3 pe-3 (1)  
pe-4access control for transmission medium p1 pe-4 pe-4  
pe-5access control for output devices p2 pe-5 pe-5  
pe-6monitoring physical access p1 pe-6 pe-6 (1) pe-6 (1) (4)  
pe-8visitor access records p3 pe-8 pe-8 pe-8 (1)  
pe-9power equipment and cabling p1 pe-9 pe-9  
pe-10emergency shutoff p1 pe-10 pe-10  
pe-11emergency power p1 pe-11 pe-11 (1)  
pe-12emergency lighting p1 pe-12 pe-12 pe-12  
pe-13fire protection p1 pe-13 pe-13 (3) pe-13 (1) (2) (3)  
pe-14temperature and humidity controls p1 pe-14 pe-14 pe-14  
pe-15water damage protection p1 pe-15 pe-15 pe-15 (1)  
pe-16delivery and removal p2 pe-16 pe-16 pe-16  
pe-17alternate work site p2 pe-17 pe-17  
pe-18location of information system components p3 pe-18  
pl-1security planning policy and procedures p1 pl-1 pl-1 pl-1  
pl-2system security plan p1 pl-2 pl-2 (3) pl-2 (3)  
pl-4rules of behavior p2 pl-4 pl-4 (1) pl-4 (1)  
pl-8information security architecture p1 pl-8 pl-8  
ps-1personnel security policy and procedures p1 ps-1 ps-1 ps-1  
ps-2position risk designation p1 ps-2 ps-2 ps-2  
ps-3personnel screening p1 ps-3 ps-3 ps-3  
ps-4personnel termination p1 ps-4 ps-4 ps-4 (2)  
ps-5personnel transfer p2 ps-5 ps-5 ps-5  
ps-6access agreements p3 ps-6 ps-6 ps-6  
ps-7third-party personnel security p1 ps-7 ps-7 ps-7  
ps-8personnel sanctions p3 ps-8 ps-8 ps-8  
ra-1risk assessment policy and procedures p1 ra-1 ra-1 ra-1  
ra-2security categorization p1 ra-2 ra-2 ra-2  
ra-3risk assessment p1 ra-3 ra-3 ra-3  
ra-5vulnerability scanning p1 ra-5 ra-5 (1) (2) (5) ra-5 (1) (2) (4) (5)  
sa-1system and services acquisition policy and procedures p1 sa-1 sa-1 sa-1  
sa-2allocation of resources p1 sa-2 sa-2 sa-2  
sa-3system development life cycle p1 sa-3 sa-3 sa-3  
sa-4acquisition process p1 sa-4 (10) sa-4 (1) (2) (9) (10) sa-4 (1) (2) (9) (10)  
sa-5information system documentation p2 sa-5 sa-5 sa-5  
sa-8security engineering principles p1 sa-8 sa-8  
sa-9external information system services p1 sa-9 sa-9 (2) sa-9 (2)  
sa-10developer configuration management p1 sa-10 sa-10  
sa-11developer security testing and evaluation p1 sa-11 sa-11  
sa-12supply chain protection p1 sa-12  
sa-15development process, standards, and tools p2 sa-15  
sa-16developer-provided training p2 sa-16  
sa-17developer security architecture and design p1 sa-17  
sc-1system and communications protection policy and procedures p1 sc-1 sc-1 sc-1  
sc-2application partitioning p1 sc-2 sc-2  
sc-3security function isolation p1 sc-3  
sc-4information in shared resources p1 sc-4 sc-4  
sc-5denial of service protection p1 sc-5 sc-5 sc-5  
sc-7boundary protection p1 sc-7 sc-7 (3) (4) (5) (7) sc-7 (3) (4) (5) (7) (8) (18) (21)  
sc-8transmission confidentiality and integrity p1 sc-8 (1) sc-8 (1)  
sc-10network disconnect p2 sc-10 sc-10  
sc-12cryptographic key establishment and management p1 sc-12 sc-12 sc-12 (1)  
sc-13cryptographic protection p1 sc-13 sc-13 sc-13  
sc-15collaborative computing devices p1 sc-15 sc-15 sc-15  
sc-17public key infrastructure certificates p1 sc-17 sc-17  
sc-18mobile code p2 sc-18 sc-18  
sc-19voice over internet protocol p1 sc-19 sc-19  
sc-20secure name / address resolution service (authoritative source) p1 sc-20 sc-20 sc-20  
sc-21secure name / address resolution service (recursive or caching resolver) p1 sc-21 sc-21 sc-21  
sc-22architecture and provisioning for name / address resolution service p1 sc-22 sc-22 sc-22  
sc-23session authenticity p1 sc-23 sc-23  
sc-24fail in known state p1 sc-24  
sc-28protection of information at rest p1 sc-28 sc-28  
sc-39process isolation p1 sc-39 sc-39 sc-39  
si-1system and information integrity policy and procedures p1 si-1 si-1 si-1  
si-2flaw remediation p1 si-2 si-2 (2) si-2 (1) (2)  
si-3malicious code protection p1 si-3 si-3 (1) (2) si-3 (1) (2)  
si-4information system monitoring p1 si-4 si-4 (2) (4) (5) si-4 (2) (4) (5)  
si-5security alerts, advisories, and directives p1 si-5 si-5 si-5 (1)  
si-6security function verification p1 si-6  
si-7software, firmware, and information integrity p1 si-7 (1) (7) si-7 (1) (2) (5) (7) (14)  
si-8spam protection p2 si-8 (1) (2) si-8 (1) (2)  
si-10information input validation p1 si-10 si-10  
si-11error handling p2 si-11 si-11  
si-12information handling and retention p2 si-12 si-12 si-12  
si-16memory protection p1 si-16 si-16  
This post is licensed under CC BY 4.0 by the author.

Comments powered by Disqus.