{"catalog":{"description":"NIST 800-53 Revision 5 Security & Privacy Controls for Information Systems and Organizations. Originally published in September of 2020 (See DOI https://doi.org/10.6028/NIST.SP.800-53r5). This catalog is derived from the machine-readable version last modified April 14, 2023 at https://github.com/usnistgov/oscal-content/tree/main/src/nist.gov/SP800-53/rev5/xml","datePublished":"2020-09-01T04:00:00","uuid":"ade1c997-bd88-4a59-b586-06421f0ad6d2","regulationDateModified":"","abstract":"This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural disasters, structural failures, foreign intelligence entities, and privacy risks. The controls are flexible and customizable and implemented as part of an organization-wide process to manage risk. The controls address diverse requirements derived from mission and business needs, laws, executive orders, directives, regulations, policies, standards, and guidelines. Finally, the consolidated control catalog addresses security and privacy from a functionality perspective (i.e., the strength of functions and mechanisms provided by the controls) and from an assurance perspective (i.e., the measure of confidence in the security or privacy capability provided by the controls). Addressing functionality and assurance helps to ensure that information technology products and the systems that rely on those products are sufficiently trustworthy.","url":"https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final","defaultName":"NIST800-53Rev5","title":"Electronic Version of NIST SP 800-53 Rev 5 Controls and SP 800-53A Rev 5 Assessment Procedures","lastRevisionDate":"2024-06-26T04:00:00","regulationDatePublished":"2020-09-01T04:00:00","keywords":" assurance; availability; computer security; confidentiality; control; cybersecurity; FISMA; information security; information system; integrity; personally identifiable information; Privacy Act; privacy controls; privacy functions; privacy requirements; Risk Management Framework; security controls; security functions; security requirements; system; system security ","requireUniqueControlId":true,"securityControls":[{"objectives":[{"objectiveType":"","otherId":"ac-1_obj.a-1","name":"AC-01a.[01]","description":"An access control policy is developed and documented;","uuid":"a3e9b818-d693-4a39-a500-9dfec462157f"},{"objectiveType":"","otherId":"ac-1_obj.a-2","name":"AC-01a.[02]","description":"The access control policy is disseminated to {{ insert: param, ac-01_odp.01 }};","uuid":"58a3211e-623b-473a-af34-8a97759370a2"},{"objectiveType":"","otherId":"ac-1_obj.a-3","name":"AC-01a.[03]","description":"Access control procedures to facilitate the implementation of the access control policy and associated controls are developed and documented;","uuid":"d9eeb9e2-241e-4057-aafc-b82af33b535c"},{"objectiveType":"","otherId":"ac-1_obj.a-4","name":"AC-01a.[04]","description":"The access control procedures are disseminated to {{ insert: param, ac-01_odp.02 }};","uuid":"46227259-ead4-443d-a522-172f2fcc3240"},{"objectiveType":"","otherId":"ac-1_obj.a.1.a-1","name":"AC-01a.01(a)[01]","description":"The {{ insert: param, ac-01_odp.03 }} access control policy addresses purpose;","uuid":"b3c67c75-28c5-4d96-9be1-09d4cd449cf5"},{"objectiveType":"","otherId":"ac-1_obj.a.1.a-2","name":"AC-01a.01(a)[02]","description":"The {{ insert: param, ac-01_odp.03 }} access control policy addresses scope;","uuid":"cf3cddce-8c94-46c5-9e83-b921032462de"},{"objectiveType":"","otherId":"ac-1_obj.a.1.a-3","name":"AC-01a.01(a)[03]","description":"The {{ insert: param, ac-01_odp.03 }} access control policy addresses roles;","uuid":"8489b811-3b5e-426a-ad13-2d4ed9aee7fd"},{"objectiveType":"","otherId":"ac-1_obj.a.1.a-4","name":"AC-01a.01(a)[04]","description":"The {{ insert: param, ac-01_odp.03 }} access control policy addresses responsibilities;","uuid":"4fdca2e0-f63a-4504-8bf0-575d638d3d3c"},{"objectiveType":"","otherId":"ac-1_obj.a.1.a-5","name":"AC-01a.01(a)[05]","description":"The {{ insert: param, ac-01_odp.03 }} access control policy addresses management commitment;","uuid":"8e925f0a-1f4c-4242-8e4e-a622d862215a"},{"objectiveType":"","otherId":"ac-1_obj.a.1.a-6","name":"AC-01a.01(a)[06]","description":"The {{ insert: param, ac-01_odp.03 }} access control policy addresses coordination among organizational entities;","uuid":"2c2bd7d8-ac1a-44b5-935b-54f1ddb4a69e"},{"objectiveType":"","otherId":"ac-1_obj.a.1.a-7","name":"AC-01a.01(a)[07]","description":"The {{ insert: param, ac-01_odp.03 }} access control policy addresses compliance;","uuid":"b0307a85-f1ae-4006-a88c-2819dd4f3981"},{"objectiveType":"","otherId":"ac-1_obj.a.1.b","name":"AC-01a.01(b)","description":"The {{ insert: param, ac-01_odp.03 }} access control policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;","uuid":"09751f0e-68c3-4d05-8b50-c13ddc93fc3c"},{"objectiveType":"","otherId":"ac-1_obj.b","name":"AC-01b.","description":"The {{ insert: param, ac-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the access control policy and procedures;","uuid":"85de562c-5fb8-4d27-8886-6f39fb4f5102"},{"objectiveType":"","otherId":"ac-1_obj.c.1-1","name":"AC-01c.01[01]","description":"The current access control policy is reviewed and updated {{ insert: param, ac-01_odp.05 }};","uuid":"102cfc6f-dd07-49b0-ae97-df2f0ca502f0"},{"objectiveType":"","otherId":"ac-1_obj.c.1-2","name":"AC-01c.01[02]","description":"The current access control policy is reviewed and updated following {{ insert: param, ac-01_odp.06 }};","uuid":"8b59a140-ab82-43e1-b51b-ea06da742801"},{"objectiveType":"","otherId":"ac-1_obj.c.2-1","name":"AC-01c.02[01]","description":"The current access control procedures are reviewed and updated {{ insert: param, ac-01_odp.07 }};","uuid":"5b907dfe-fa06-4ce9-a610-68558e3262cd"},{"objectiveType":"","otherId":"ac-1_obj.c.2-2","name":"AC-01c.02[02]","description":"The current access control procedures are reviewed and updated following {{ insert: param, ac-01_odp.08 }}.","uuid":"2806f1f8-c437-4687-a130-c73b2b915ab8"}],"description":"