Catalog: NIST SP 800-53 Rev 5 | Controls: 51
| Control ID | Title / Statement | Priority | Baseline Impact |
|---|---|---|---|
| SC-01 |
Policy and Procedures
|
P1 | L M H |
| SC-02 |
Separation of System and User Functionality
|
P1 | M H |
| SC-03 |
Security Function Isolation
|
P1 | H |
| SC-04 |
Information in Shared System Resources
|
P1 | M H |
| SC-05 |
Denial-of-Service Protection
|
P1 | M H |
| SC-06 |
Withdrawn
|
P0 | — |
| SC-07 |
Boundary Protection
|
P1 | L M H |
| SC-08 |
Transmission Confidentiality and Integrity
|
P1 | M H |
| SC-09 |
Withdrawn
|
P0 | — |
| SC-10 |
Network Disconnect
|
P2 | M H |
| SC-11 |
Withdrawn
|
P0 | — |
| SC-12 |
Cryptographic Key Establishment and Management
|
P1 | M H |
| SC-13 |
Cryptographic Protection
|
P1 | M H |
| SC-14 |
Withdrawn
|
P0 | — |
| SC-15 |
Withdrawn
|
P0 | — |
| SC-16 |
Secure Name/Address Resolution Service
|
P1 | L M H |
| SC-17 |
Secure Name/Address Resolution Service (Recursive or Caching Resolver)
|
P1 | L M H |
| SC-18 |
Architecture and Provisioning for Name/Address Resolution Service
|
P1 | H |
| SC-19 |
Session Authenticity
|
P1 | M H |
| SC-20 |
Protection of Information at Rest
|
P1 | M H |
| SC-21 |
Withdrawn
|
P0 | — |
| SC-22 |
Withdrawn
|
P0 | — |
| SC-23 |
Withdrawn
|
P0 | — |
| SC-24 |
Withdrawn
|
P0 | — |
| SC-25 |
Thin Nodes
|
P0 | — |
| SC-26 |
Honeypots
|
P0 | — |
| SC-27 |
Platform-Independent Applications
|
P0 | — |
| SC-28 |
Application Partitioning
|
P0 | — |
| SC-29 |
Heterogeneity
|
P0 | — |
| SC-30 |
Concealment and Misdirection
|
P0 | — |
| SC-31 |
Covert Channel Analysis
|
P0 | — |
| SC-32 |
Information System Partitioning
|
P0 | — |
| SC-33 |
Withdrawn
|
P0 | — |
| SC-34 |
Non-Modifiable Executable Programs
|
P0 | — |
| SC-35 |
Honeyclients
|
P0 | — |
| SC-36 |
Distributed Processing and Storage
|
P0 | — |
| SC-37 |
Out-of-Band Channels
|
P0 | — |
| SC-38 |
Operations Security
|
P0 | — |
| SC-39 |
Process Isolation
|
P1 | H |
| SC-40 |
Withdrawn
|
P0 | — |
| SC-41 |
Withdrawn
|
P0 | — |
| SC-42 |
Withdrawn
|
P0 | — |
| SC-43 |
Usage Restrictions
|
P0 | — |
| SC-44 |
Detonation Chambers
|
P0 | — |
| SC-45 |
System Time Synchronization
|
P0 | — |
| SC-46 |
Cross Domain Policy Enforcement
|
P0 | — |
| SC-47 |
Redundancy
|
P0 | — |
| SC-48 |
Sensors
|
P0 | — |
| SC-49 |
Hardware-Based Protection
|
P0 | — |
| SC-50 |
Software-Enforced Separation and Policy Enforcement
|
P0 | — |
| SC-51 |
Physical Machine Separation
|
P0 | — |