NIST 800-53 Rev 5 Control Catalogue

315 security and privacy controls organized by family. Each control includes mappings to ISO 27001:2022, ISO 27002:2022, COBIT 2019, CIS Controls v8, NIST CSF 2.0, SOC 2 TSC, PCI DSS v4.0.1, CSA CCM v4, CSA AICM v1, FINOS CCC, ISO 42001:2023, IEC 62443, NIS2 Directive, PRA Operational Resilience, MAS TRM, APRA CPS 234, ASD Essential Eight, BSI IT-Grundschutz, ANSSI, FINMA Circular 2023/1, OSFI B-13, EU GDPR, EU DORA, BIO2, RBI CSF, FISC Security Guidelines, LGPD + BCB 4893, HKMA TM-E-1, MLPS 2.0, DNB Good Practice, EU CRA, SWIFT CSCF, SAMA CSF, NCA ECC, UAE IA, CBB TM, Qatar NIA, CBUAE, CBE CSF, SA JS2, CBN CSF, BoG CISD, POPIA, BoM CTRM, IOSCO Cyber Resilience, BCBS 239, CPMI-IOSCO PFMI, FFIEC IS, NYDFS 500, HIPAA Security Rule, ECB CROE, EBA ICT Guidelines, SEBI CSCRF, BOT Cyber Resilience, CMMC 2.0, NERC CIP, 10 CFR 73.54, TSA Pipeline SD, IEEE 1686-2022, FERC CIP Orders, DOE C2M2 v2.1, API 1164, AWIA, IAEA NSS 17-T, PCI PTS v6, FIPS 140-3, CBEST, TIBER-EU, PCI HSM, Common Criteria, ISAE 3402, Solvency II, Lloyd's Minimum Standards, NAIC Insurance Data Security, PRA SS1/23, FCA SYSC 13, HITRUST CSF v11, FDA 21 CFR Part 11, FDA Cybersecurity Guidance, ISO 27799, NHS DSPT, OWASP MASVS v2.1, CCSS v9.0, MiCA, Basel SCO60, BSSC Standards, and SEC Custody (Digital Assets).

SC System and Communications Protection

50 controls

ID Name Low Mod High
SC-01 System And Communications Protection Policy And Procedures
SC-02 Application Partitioning
SC-03 Security Function Isolation
SC-04 Information Remnance
SC-05 Denial Of Service Protection
SC-06 Resource Priority
SC-07 Boundary Protection
SC-08 Transmission Integrity
SC-09 Transmission Confidentiality
SC-10 Network Disconnect
SC-11 Trusted Path
SC-12 Cryptographic Key Establishment And Management
SC-13 Use Of Cryptography
SC-14 Public Access Protections
SC-15 Collaborative Computing
SC-16 Transmission Of Security Parameters
SC-17 Public Key Infrastructure Certificates
SC-18 Mobile Code
SC-19 Voice Over Internet Protocol
SC-20 Secure Name / Address Resolution Service (Authoritative Source)
SC-21 Secure Name / Address Resolution Service (Recursive Or Caching Resolver)
SC-22 Architecture And Provisioning For Name / Address Resolution Service
SC-23 Session Authenticity
SC-24 Fail in Known State - -
SC-25 Thin Nodes - - -
SC-26 Decoys - - -
SC-27 Platform-independent Applications - - -
SC-28 Protection of Information at Rest -
SC-29 Heterogeneity - - -
SC-30 Concealment and Misdirection - - -
SC-31 Covert Channel Analysis - - -
SC-32 System Partitioning - - -
SC-34 Non-modifiable Executable Programs - - -
SC-35 External Malicious Code Identification - - -
SC-36 Distributed Processing and Storage - - -
SC-37 Out-of-band Channels - - -
SC-38 Operations Security - - -
SC-39 Process Isolation
SC-40 Wireless Link Protection - - -
SC-41 Port and I/O Device Access - - -
SC-42 Sensor Capability and Data - - -
SC-43 Usage Restrictions - - -
SC-44 Detonation Chambers - - -
SC-45 System Time Synchronization - - -
SC-46 Cross Domain Policy Enforcement - - -
SC-47 Alternate Communications Paths - - -
SC-48 Sensor Relocation - - -
SC-49 Hardware-enforced Separation and Policy Enforcement - - -
SC-50 Software-enforced Separation and Policy Enforcement - - -
SC-51 Hardware-based Protection - - -