NIST Special Publication 800-53 Revisions 3, 4, and 5

Filemaker_Mexico_Consultores_Desarrollo_03

Title: Security and Privacy Controls for Federal Information Systems and Organizations

Overview: NIST SP 800-53 provides a catalog of security and privacy controls for federal information systems and organizations. The publication outlines a process for selecting and implementing these controls to protect organizational operations, assets, individuals, and the nation from a diverse set of threats.

Revisions:

  • Revision 3: Introduced significant improvements to the security control catalog, including new controls and enhancements to existing controls.
  • Revision 4: Expanded the control catalog to address new threats and technologies, and included privacy controls to protect personally identifiable information (PII).
  • Revision 5: Integrated security and privacy controls into a unified control catalog, updated controls to address emerging threats, and provided mappings to other frameworks and standards.

Key Control Families:

  1. Access Control (AC): Controls related to limiting access to information systems and data.
  2. Audit and Accountability (AU): Controls for monitoring and recording system activities.
  3. Security Assessment and Authorization (CA): Controls for assessing and authorizing information systems.
  4. Configuration Management (CM): Controls for managing system configurations.
  5. Contingency Planning (CP): Controls for preparing for and responding to emergencies.
  6. Identification and Authentication (IA): Controls for verifying the identity of users and devices.
  7. Incident Response (IR): Controls for detecting and responding to security incidents.
  8. Maintenance (MA): Controls for maintaining system security.
  9. Media Protection (MP): Controls for protecting information stored on media.
  10. Physical and Environmental Protection (PE): Controls for securing physical access to systems.
  11. Planning (PL): Controls for developing security plans.
  12. Personnel Security (PS): Controls for managing personnel security.
  13. Risk Assessment (RA): Controls for assessing risks to information systems.
  14. System and Services Acquisition (SA): Controls for acquiring secure systems and services.
  15. System and Communications Protection (SC): Controls for protecting system communications.
  16. System and Information Integrity (SI): Controls for ensuring system integrity.

Contáctanos! / Contact Us.

Contactanos-IADARA-Consultoria Especializada-Desarrollos a la Medida-Ciberseguridad-FileMaker
Contactanos-IADARA-Consultoria Especializada-Desarrollos a la Medida-Ciberseguridad-FileMaker

Please let us know how can we help you filling the following form or gives a call: +52 55 2060 4781 , number in Mexico.

Contáctenos llenando este formato o puede llamar al +52 55 2060 4781 en México.
Por favor, díganos sus necesidades y requerimientos.

    Related Posts