>myctrl.tools
GitHub
Home / Frameworks / NIST 800-53 / HIGH Baseline

NIST SP 800-53 Revision 5

Security and Privacy Controls for Information Systems and Organizations

Showing 370 controls in HIGH baseline

AC Access Control (46 controls)

AC-1Policy And Procedures
LOW
MODERATE
HIGH
PRIVACY
AC-2Account Management
LOW
MODERATE
HIGH
AC-2(1)Automated System Account Management
MODERATE
HIGH
AC-2(2)Automated Temporary And Emergency Account Management
MODERATE
HIGH
AC-2(3)Disable Accounts
MODERATE
HIGH
AC-2(4)Automated Audit Actions
MODERATE
HIGH
AC-2(5)Inactivity Logout
MODERATE
HIGH
AC-2(11)Usage Conditions
HIGH
AC-2(12)Account Monitoring For Atypical Usage
HIGH
AC-2(13)Disable Accounts For High-Risk Individuals
MODERATE
HIGH
AC-3Access Enforcement
LOW
MODERATE
HIGH
AC-4Information Flow Enforcement
MODERATE
HIGH
AC-4(4)Flow Control Of Encrypted Information
HIGH
AC-5Separation Of Duties
MODERATE
HIGH
AC-6Least Privilege
MODERATE
HIGH
AC-6(1)Authorize Access To Security Functions
MODERATE
HIGH
AC-6(2)Non-Privileged Access For Nonsecurity Functions
MODERATE
HIGH
AC-6(3)Network Access To Privileged Commands
HIGH
AC-6(5)Privileged Accounts
MODERATE
HIGH
AC-6(7)Review Of User Privileges
MODERATE
HIGH
AC-6(9)Log Use Of Privileged Functions
MODERATE
HIGH
AC-6(10)Prohibit Non-Privileged Users From Executing Privileged Functions
MODERATE
HIGH
AC-7Unsuccessful Logon Attempts
LOW
MODERATE
HIGH
AC-8System Use Notification
LOW
MODERATE
HIGH
AC-10Concurrent Session Control
HIGH
AC-11Device Lock
MODERATE
HIGH
AC-11(1)Pattern-Hiding Displays
MODERATE
HIGH
AC-12Session Termination
MODERATE
HIGH
AC-14Permitted Actions Without Identification Or Authentication
LOW
MODERATE
HIGH
AC-17Remote Access
LOW
MODERATE
HIGH
AC-17(1)Monitoring And Control
MODERATE
HIGH
AC-17(2)Protection Of Confidentiality And Integrity Using Encryption
MODERATE
HIGH
AC-17(3)Managed Access Control Points
MODERATE
HIGH
AC-17(4)Privileged Commands And Access
MODERATE
HIGH
AC-18Wireless Access
LOW
MODERATE
HIGH
AC-18(1)Authentication And Encryption
MODERATE
HIGH
AC-18(3)Disable Wireless Networking
MODERATE
HIGH
AC-18(4)Restrict Configurations By Users
HIGH
AC-18(5)Antennas And Transmission Power Levels
HIGH
AC-19Access Control For Mobile Devices
LOW
MODERATE
HIGH
AC-19(5)Full Device Or Container-Based Encryption
MODERATE
HIGH
AC-20Use Of External Systems
LOW
MODERATE
HIGH
AC-20(1)Limits On Authorized Use
MODERATE
HIGH
AC-20(2)Portable Storage Devices — Restricted Use
MODERATE
HIGH
AC-21Information Sharing
MODERATE
HIGH
AC-22Publicly Accessible Content
LOW
MODERATE
HIGH

CM Configuration Management (32 controls)

CM-1Policy And Procedures
LOW
MODERATE
HIGH
PRIVACY
CM-2Baseline Configuration
LOW
MODERATE
HIGH
CM-2(2)Automation Support For Accuracy And Currency
MODERATE
HIGH
CM-2(3)Retention Of Previous Configurations
MODERATE
HIGH
CM-2(7)Configure Systems And Components For High-Risk Areas
MODERATE
HIGH
CM-3Configuration Change Control
MODERATE
HIGH
CM-3(1)Automated Documentation, Notification, And Prohibition Of Changes
HIGH
CM-3(2)Testing, Validation, And Documentation Of Changes
MODERATE
HIGH
CM-3(4)Security And Privacy Representatives
MODERATE
HIGH
CM-3(6)Cryptography Management
HIGH
CM-4Impact Analyses
LOW
MODERATE
HIGH
PRIVACY
CM-4(1)Separate Test Environments
HIGH
CM-4(2)Verification Of Controls
MODERATE
HIGH
CM-5Access Restrictions For Change
LOW
MODERATE
HIGH
CM-5(1)Automated Access Enforcement And Audit Records
HIGH
CM-6Configuration Settings
LOW
MODERATE
HIGH
CM-6(1)Automated Management, Application, And Verification
HIGH
CM-6(2)Respond To Unauthorized Changes
HIGH
CM-7Least Functionality
LOW
MODERATE
HIGH
CM-7(1)Periodic Review
MODERATE
HIGH
CM-7(2)Prevent Program Execution
MODERATE
HIGH
CM-7(5)Authorized Software — Allow-By-Exception
MODERATE
HIGH
CM-8System Component Inventory
LOW
MODERATE
HIGH
CM-8(1)Updates During Installation And Removal
MODERATE
HIGH
CM-8(2)Automated Maintenance
HIGH
CM-8(3)Automated Unauthorized Component Detection
MODERATE
HIGH
CM-8(4)Accountability Information
HIGH
CM-9Configuration Management Plan
MODERATE
HIGH
CM-10Software Usage Restrictions
LOW
MODERATE
HIGH
CM-11User-Installed Software
LOW
MODERATE
HIGH
CM-12Information Location
MODERATE
HIGH
CM-12(1)Automated Tools To Support Information Location
MODERATE
HIGH

CP Contingency Planning (35 controls)

SC System and Communications Protection (30 controls)