Security and Privacy Controls for Information Systems and Organizations

See the Errata (beginning on p. xvii) for a list of updates to the original publication.

New supplemental materials are also available:

Author(s)

Joint Task Force

Abstract

This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural disasters, structural failures, foreign intelligence entities, and privacy risks. The controls are flexible and customizable and implemented as part of an organization-wide process to manage risk. The controls address diverse requirements derived from mission and business needs, laws, executive orders, directives, regulations, policies, standards, and guidelines. Finally, the consolidated control catalog addresses security and privacy from a functionality perspective (i.e., the strength of functions and mechanisms provided by the controls) and from an assurance perspective (i.e., the measure of confidence in the security or privacy capability provided by the controls). Addressing functionality and assurance helps to ensure that information technology products and the systems that rely on those products are sufficiently trustworthy.

This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural. See full abstract

This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural disasters, structural failures, foreign intelligence entities, and privacy risks. The controls are flexible and customizable and implemented as part of an organization-wide process to manage risk. The controls address diverse requirements derived from mission and business needs, laws, executive orders, directives, regulations, policies, standards, and guidelines. Finally, the consolidated control catalog addresses security and privacy from a functionality perspective (i.e., the strength of functions and mechanisms provided by the controls) and from an assurance perspective (i.e., the measure of confidence in the security or privacy capability provided by the controls). Addressing functionality and assurance helps to ensure that information technology products and the systems that rely on those products are sufficiently trustworthy.

Keywords

assurance ; availability ; computer security ; confidentiality ; control ; cybersecurity ; FISMA ; information security ; information system ; integrity ; personally identifiable information ; Privacy Act ; privacy controls ; privacy functions ; privacy requirements ; Risk Management Framework ; security controls ; security functions ; security requirements ; system ; system security

Control Families

Access Control ; Audit and Accountability ; Awareness and Training ; Configuration Management ; Contingency Planning ; Assessment, Authorization and Monitoring ; Identification and Authentication ; Incident Response ; Maintenance ; Media Protection ; Personnel Security ; Physical and Environmental Protection ; Planning ; Risk Assessment ; System and Services Acquisition ; System and Information Integrity ; System and Communications Protection ; Program Management ; PII Processing and Transparency ; Supply Chain Risk Management

Documentation

Other Parts of this Publication:
SP 800-53B

Document History:
12/10/20: SP 800-53 Rev. 5 (Final)