Since NIST 800-53 was first introduced, the number of controls has greatly expanded; the initial version of 800-53 contained approximately 300 controls and NIST 800-53 rev 4 contains 965 controls.Â
Note:Â
1. ISO 27001(2013)Â is a management system that is comprised of 114 management controls.Â
2. Formerly the SANS Critical Security Controls (SANS Top 20) these are now officially called the CIS Critical Security Controls (CIS Controls).CIS Controls Version 8 combines and consolidates the CIS Controls by activities, rather than by who manages the devices. Physical devices, fixed boundaries, and discrete islands of security implementation are less important; this is reflected in v8 through revised terminology and grouping of Safeguards, resulting in a decrease of the number of Controls from 20 to 18.
Despite the complexity, each NIST 800-53 revision makes the controls set increasingly valuable. As things like mobile, IoT, and cloud evolve, NIST continuously enhances 800-53 to make migration an ongoing requirement.
800-53 (Rev. 4) Security Control Catalog
NIST Baseline Tailer
Security Objectives / Impact / Required Security Controls
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
 Impact |
Confidentiality |
Integrity |
Availability |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Low |
Login Audit |
Antivirus |
Onsite Backup |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Moderate |
Login Audit |
Antivirus |
High Availability |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
High |
Login Audit |
Antivirus |
High Availability |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The following list is showing those most common controls align with the impact level in 800-53. Impact / Required Security Controls (Based on 800-53)
|
NIST SP 800-53 Full Control List
https://www.stigviewer.com/controls/800-53NIST priorities are from P0 to P5, with P1 being the highest priority. Generally 1-5 dictates the order in which the controls should be implemented.
There is a P0 – which is the lowest priority.
Num. |
Title |
Impact |
Priority |
Subject Area |
AC-1 |
LOW |
P1 |
Access Control |
|
AC-2 |
LOW |
P1 |
Access Control |
|
AC-3 |
LOW |
P1 |
Access Control |
|
AC-7 |
LOW |
P2 |
Access Control |
|
AC-8 |
LOW |
P1 |
Access Control |
|
AC-14 |
LOW |
P3 |
Access Control |
|
AC-17 |
LOW |
P1 |
Access Control |
|
AC-18 |
LOW |
P1 |
Access Control |
|
AC-19 |
LOW |
P1 |
Access Control |
|
AC-20 |
LOW |
P1 |
Access Control |
|
AC-22 |
LOW |
P3 |
Access Control |
|
AT-1 |
LOW |
P1 |
Awareness And
Training |
|
AT-2 |
LOW |
P1 |
Awareness And
Training |
|
AT-3 |
LOW |
P1 |
Awareness And
Training |
|
AT-4 |
LOW |
P3 |
Awareness And
Training |
|
AU-1 |
LOW |
P1 |
Audit And
Accountability |
|
AU-2 |
LOW |
P1 |
Audit And
Accountability |
|
AU-3 |
LOW |
P1 |
Audit And
Accountability |
|
AU-4 |
LOW |
P1 |
Audit And
Accountability |
|
AU-5 |
LOW |
P1 |
Audit And
Accountability |
|
AU-6 |
LOW |
P1 |
Audit And
Accountability |
|
AU-8 |
LOW |
P1 |
Audit And
Accountability |
|
AU-9 |
LOW |
P1 |
Audit And
Accountability |
|
AU-11 |
LOW |
P3 |
Audit And
Accountability |
|
AU-12 |
LOW |
P1 |
Audit And
Accountability |
|
CA-1 |
LOW |
P1 |
Security
Assessment And Authorization |
|
CA-2 |
LOW |
P2 |
Security
Assessment And Authorization |
|
CA-3 |
LOW |
P1 |
Security
Assessment And Authorization |
|
CA-5 |
LOW |
P3 |
Security
Assessment And Authorization |
|
CA-6 |
LOW |
P2 |
Security
Assessment And Authorization |
|
CA-7 |
LOW |
P2 |
Security
Assessment And Authorization |
|
CA-9 |
LOW |
P2 |
Security
Assessment And Authorization |
|
CM-1 |
LOW |
P1 |
Configuration
Management |
|
CM-2 |
LOW |
P1 |
Configuration
Management |
|
CM-4 |
LOW |
P2 |
Configuration
Management |
|
CM-6 |
LOW |
P1 |
Configuration
Management |
|
CM-7 |
LOW |
P1 |
Configuration
Management |
|
CM-8 |
LOW |
P1 |
Configuration
Management |
|
CM-10 |
LOW |
P2 |
Configuration
Management |
|
CM-11 |
LOW |
P1 |
Configuration
Management |
|
CP-1 |
LOW |
P1 |
Contingency
Planning |
|
CP-2 |
LOW |
P1 |
Contingency
Planning |
|
CP-3 |
LOW |
P2 |
Contingency
Planning |
|
CP-4 |
LOW |
P2 |
Contingency
Planning |
|
CP-9 |
LOW |
P1 |
Contingency
Planning |
|
CP-10 |
LOW |
P1 |
Contingency
Planning |
|
IA-1 |
LOW |
P1 |
Identification
And Authentication |
|
IA-2 |
LOW |
P1 |
Identification
And Authentication |
|
IA-4 |
LOW |
P1 |
Identification
And Authentication |
|
IA-5 |
LOW |
P1 |
Identification
And Authentication |
|
IA-6 |
LOW |
P2 |
Identification
And Authentication |
|
IA-7 |
LOW |
P1 |
Identification
And Authentication |
|
IA-8 |
IDENTIFICATION
AND AUTHENTICATION (NON-ORGANIZATIONAL USERS) |
LOW |
P1 |
Identification
And Authentication |
IR-1 |
LOW |
P1 |
Incident Response |
|
IR-2 |
LOW |
P2 |
Incident Response |
|
IR-4 |
LOW |
P1 |
Incident Response |
|
IR-5 |
LOW |
P1 |
Incident Response |
|
IR-6 |
LOW |
P1 |
Incident Response |
|
IR-7 |
LOW |
P2 |
Incident Response |
|
IR-8 |
LOW |
P1 |
Incident Response |
|
MA-1 |
LOW |
P1 |
Maintenance |
|
MA-2 |
LOW |
P2 |
Maintenance |
|
MA-4 |
LOW |
P2 |
Maintenance |
|
MA-5 |
LOW |
P2 |
Maintenance |
|
MP-1 |
LOW |
P1 |
Media Protection |
|
MP-2 |
LOW |
P1 |
Media Protection |
|
MP-6 |
LOW |
P1 |
Media Protection |
|
MP-7 |
LOW |
P1 |
Media Protection |
|
PE-1 |
LOW |
P1 |
Physical And
Environmental Protection |
|
PE-2 |
LOW |
P1 |
Physical And
Environmental Protection |
|
PE-3 |
LOW |
P1 |
Physical And
Environmental Protection |
|
PE-6 |
LOW |
P1 |
Physical And
Environmental Protection |
|
PE-8 |
LOW |
P3 |
Physical And
Environmental Protection |
|
PE-12 |
LOW |
P1 |
Physical And
Environmental Protection |
|
PE-13 |
LOW |
P1 |
Physical And
Environmental Protection |
|
PE-14 |
LOW |
P1 |
Physical And
Environmental Protection |
|
PE-15 |
LOW |
P1 |
Physical And
Environmental Protection |
|
PE-16 |
LOW |
P2 |
Physical And
Environmental Protection |
|
PL-1 |
LOW |
P1 |
Planning |
|
PL-2 |
LOW |
P1 |
Planning |
|
PL-4 |
LOW |
P2 |
Planning |
|
PS-1 |
LOW |
P1 |
Personnel
Security |
|
PS-2 |
LOW |
P1 |
Personnel
Security |
|
PS-3 |
LOW |
P1 |
Personnel
Security |
|
PS-4 |
LOW |
P1 |
Personnel
Security |
|
PS-5 |
LOW |
P2 |
Personnel
Security |
|
PS-6 |
LOW |
P3 |
Personnel
Security |
|
PS-7 |
LOW |
P1 |
Personnel
Security |
|
PS-8 |
LOW |
P3 |
Personnel
Security |
|
RA-1 |
LOW |
P1 |
Risk Assessment |
|
RA-2 |
LOW |
P1 |
Risk Assessment |
|
RA-3 |
LOW |
P1 |
Risk Assessment |
|
RA-5 |
LOW |
P1 |
Risk Assessment |
|
SA-1 |
LOW |
P1 |
System And
Services Acquisition |
|
SA-2 |
LOW |
P1 |
System And
Services Acquisition |
|
SA-3 |
LOW |
P1 |
System And
Services Acquisition |
|
SA-4 |
LOW |
P1 |
System And
Services Acquisition |
|
SA-5 |
LOW |
P2 |
System And
Services Acquisition |
|
SA-9 |
LOW |
P1 |
System And
Services Acquisition |
|
SC-1 |
LOW |
P1 |
System And
Communications Protection |
|
SC-5 |
LOW |
P1 |
System And
Communications Protection |
|
SC-7 |
LOW |
P1 |
System And Communications
Protection |
|
SC-12 |
LOW |
P1 |
System And
Communications Protection |
|
SC-13 |
LOW |
P1 |
System And
Communications Protection |
|
SC-15 |
LOW |
P1 |
System And
Communications Protection |
|
SC-20 |
SECURE
NAME / ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE) |
LOW |
P1 |
System And
Communications Protection |
SC-21 |
SECURE
NAME / ADDRESS RESOLUTION SERVICE (RECURSIVE OR CACHING RESOLVER) |
LOW |
P1 |
System And
Communications Protection |
SC-22 |
ARCHITECTURE
AND PROVISIONING FOR NAME / ADDRESS RESOLUTION SERVICE |
LOW |
P1 |
System And
Communications Protection |
SC-39 |
LOW |
P1 |
System And
Communications Protection |
|
SI-1 |
LOW |
P1 |
System And
Information Integrity |
|
SI-2 |
LOW |
P1 |
System And
Information Integrity |
|
SI-3 |
LOW |
P1 |
System And
Information Integrity |
|
SI-4 |
LOW |
P1 |
System And
Information Integrity |
|
SI-5 |
LOW |
P1 |
System And
Information Integrity |
|
SI-12 |
LOW |
P2 |
System And
Information Integrity |
Num. |
Title |
Impact |
Priority |
Subject Area |
AC-4 |
MODERATE |
P1 |
Access Control |
|
AC-5 |
MODERATE |
P1 |
Access Control |
|
AC-6 |
MODERATE |
P1 |
Access Control |
|
AC-11 |
MODERATE |
P3 |
Access Control |
|
AC-12 |
MODERATE |
P2 |
Access Control |
|
AC-21 |
MODERATE |
P2 |
Access Control |
|
AU-7 |
MODERATE |
P2 |
Audit And
Accountability |
|
CM-3 |
MODERATE |
P1 |
Configuration
Management |
|
CM-5 |
MODERATE |
P1 |
Configuration
Management |
|
CM-9 |
MODERATE |
P1 |
Configuration
Management |
|
CP-6 |
MODERATE |
P1 |
Contingency
Planning |
|
CP-7 |
MODERATE |
P1 |
Contingency
Planning |
|
CP-8 |
MODERATE |
P1 |
Contingency
Planning |
|
IA-3 |
MODERATE |
P1 |
Identification
And Authentication |
|
IR-3 |
MODERATE |
P2 |
Incident Response |
|
MA-3 |
MODERATE |
P3 |
Maintenance |
|
MA-6 |
MODERATE |
P2 |
Maintenance |
|
MP-3 |
MODERATE |
P2 |
Media Protection |
|
MP-4 |
MODERATE |
P1 |
Media Protection |
|
MP-5 |
MODERATE |
P1 |
Media Protection |
|
PE-4 |
MODERATE |
P1 |
Physical And
Environmental Protection |
|
PE-5 |
MODERATE |
P2 |
Physical And
Environmental Protection |
|
PE-9 |
MODERATE |
P1 |
Physical And
Environmental Protection |
|
PE-10 |
MODERATE |
P1 |
Physical And
Environmental Protection |
|
PE-11 |
MODERATE |
P1 |
Physical And
Environmental Protection |
|
PE-17 |
MODERATE |
P2 |
Physical And
Environmental Protection |
|
PL-8 |
MODERATE |
P1 |
Planning |
|
SA-8 |
MODERATE |
P1 |
System And
Services Acquisition |
|
SA-10 |
MODERATE |
P1 |
System And
Services Acquisition |
|
SA-11 |
MODERATE |
P1 |
System And
Services Acquisition |
|
SC-2 |
MODERATE |
P1 |
System And
Communications Protection |
|
SC-4 |
MODERATE |
P1 |
System And
Communications Protection |
|
SC-8 |
MODERATE |
P1 |
System And
Communications Protection |
|
SC-10 |
MODERATE |
P2 |
System And
Communications Protection |
|
SC-17 |
MODERATE |
P1 |
System And
Communications Protection |
|
SC-18 |
MODERATE |
P2 |
System And
Communications Protection |
|
SC-19 |
MODERATE |
P1 |
System And Communications
Protection |
|
SC-23 |
MODERATE |
P1 |
System And
Communications Protection |
|
SC-28 |
MODERATE |
P1 |
System And
Communications Protection |
|
SI-7 |
MODERATE |
P1 |
System And
Information Integrity |
|
SI-8 |
MODERATE |
P2 |
System And
Information Integrity |
|
SI-10 |
MODERATE |
P1 |
System And
Information Integrity |
|
SI-11 |
MODERATE |
P2 |
System And
Information Integrity |
|
SI-16 |
MODERATE |
P1 |
System And
Information Integrity |
Num. |
Title |
Impact |
Priority |
Subject Area |
AC-10 |
HIGH |
P3 |
Access Control |
|
AU-10 |
HIGH |
P2 |
Audit And
Accountability |
|
CA-8 |
HIGH |
P2 |
Security
Assessment And Authorization |
|
PE-18 |
HIGH |
P3 |
Physical And
Environmental Protection |
|
SA-12 |
HIGH |
P1 |
System And
Services Acquisition |
|
SA-15 |
HIGH |
P2 |
System And
Services Acquisition |
|
SA-16 |
HIGH |
P2 |
System And
Services Acquisition |
|
SA-17 |
HIGH |
P1 |
System And
Services Acquisition |
|
SC-3 |
HIGH |
P1 |
System And
Communications Protection |
|
SC-24 |
HIGH |
P1 |
System And
Communications Protection |
|
SI-6 |
HIGH |
P1 |
System And
Information Integrity |
Num. |
Title |
Impact |
Priority |
Subject Area |
AC-9 |
P0 |
Access Control |
||
AC-13 |
Access Control |
|||
AC-15 |
Access Control |
|||
AC-16 |
P0 |
Access Control |
||
AC-23 |
P0 |
Access Control |
||
AC-24 |
P0 |
Access Control |
||
AC-25 |
P0 |
Access Control |
||
AT-5 |
Awareness And
Training |
|||
AU-13 |
P0 |
Audit And
Accountability |
||
AU-14 |
P0 |
Audit And
Accountability |
||
AU-15 |
P0 |
Audit And
Accountability |
||
AU-16 |
P0 |
Audit And
Accountability |
||
CA-4 |
Security
Assessment And Authorization |
|||
CP-5 |
Contingency
Planning |
|||
CP-11 |
P0 |
Contingency
Planning |
||
CP-12 |
P0 |
Contingency
Planning |
||
CP-13 |
P0 |
Contingency
Planning |
||
IA-9 |
P0 |
Identification
And Authentication |
||
IA-10 |
P0 |
Identification
And Authentication |
||
IA-11 |
P0 |
Identification
And Authentication |
||
IR-9 |
P0 |
Incident Response |
||
IR-10 |
P0 |
Incident Response |
||
MP-8 |
P0 |
Media Protection |
||
PE-7 |
Physical And
Environmental Protection |
|||
PE-19 |
P0 |
Physical And
Environmental Protection |
||
PE-20 |
P0 |
Physical And
Environmental Protection |
||
PL-3 |
Planning |
|||
PL-5 |
Planning |
|||
PL-6 |
Planning |
|||
PL-7 |
P0 |
Planning |
||
PL-9 |
P0 |
Planning |
||
RA-4 |
Risk Assessment |
|||
RA-6 |
P0 |
Risk Assessment |
||
SA-6 |
System And
Services Acquisition |
|||
SA-7 |
System And
Services Acquisition |
|||
SA-13 |
P0 |
System And
Services Acquisition |
||
SA-14 |
P0 |
System And
Services Acquisition |
||
SA-18 |
P0 |
System And
Services Acquisition |
||
SA-19 |
P0 |
System And
Services Acquisition |
||
SA-20 |
P0 |
System And
Services Acquisition |
||
SA-21 |
P0 |
System And
Services Acquisition |
||
SA-22 |
P0 |
System And
Services Acquisition |
||
SC-6 |
P0 |
System And
Communications Protection |
||
SC-9 |
System And
Communications Protection |
|||
SC-11 |
P0 |
System And
Communications Protection |
||
SC-14 |
System And
Communications Protection |
|||
SC-16 |
P0 |
System And
Communications Protection |
||
SC-25 |
P0 |
System And
Communications Protection |
||
SC-26 |
P0 |
System And
Communications Protection |
||
SC-27 |
P0 |
System And
Communications Protection |
||
SC-29 |
P0 |
System And
Communications Protection |
||
SC-30 |
P0 |
System And
Communications Protection |
||
SC-31 |
P0 |
System And
Communications Protection |
||
SC-32 |
P0 |
System And
Communications Protection |
||
SC-33 |
System And
Communications Protection |
|||
SC-34 |
P0 |
System And
Communications Protection |
||
SC-35 |
P0 |
System And
Communications Protection |
||
SC-36 |
P0 |
System And
Communications Protection |
||
SC-37 |
P0 |
System And
Communications Protection |
||
SC-38 |
P0 |
System And
Communications Protection |
||
SC-40 |
P0 |
System And
Communications Protection |
||
SC-41 |
P0 |
System And
Communications Protection |
||
SC-42 |
P0 |
System And
Communications Protection |
||
SC-43 |
P0 |
System And
Communications Protection |
||
SC-44 |
P0 |
System And
Communications Protection |
||
SI-9 |
System And
Information Integrity |
|||
SI-13 |
P0 |
System And
Information Integrity |
||
SI-14 |
P0 |
System And
Information Integrity |
||
SI-15 |
P0 |
System And
Information Integrity |
||
SI-17 |
P0 |
System And
Information Integrity |
||
PM-1 |
Program
Management |
|||
PM-2 |
Program
Management |
|||
PM-3 |
Program
Management |
|||
PM-4 |
Program
Management |
|||
PM-5 |
Program
Management |
|||
PM-6 |
Program
Management |
|||
PM-7 |
Program
Management |
|||
PM-8 |
Program
Management |
|||
PM-9 |
Program
Management |
|||
PM-10 |
Program
Management |
|||
PM-11 |
Program
Management |
|||
PM-12 |
Program
Management |
|||
PM-13 |
Program
Management |
|||
PM-14 |
Program
Management |
|||
PM-15 |
Program
Management |
|||
PM-16 |
Program
Management |
No comments:
Post a Comment