home || catalog: SP800-53rev3 / class: Technical ||
search controls:
search nistpubs:

(AC) Access Control
(AC-01) Access Control Policy and Procedures
(AC-02) Account Management
(AC-03) Access Enforcement
(AC-04) Information Flow Enforcement
(AC-05) Separation of Duties
(AC-06) Least Privilege
(AC-07) Unsuccessful Login Attempts
(AC-08) System Use Notification
(AC-09) Previous Logon (Access) Notification
(AC-10) Concurrent Session Control
(AC-11) Session Lock
(AC-12) Session Termination
(AC-13) Supervision and Review — Access Control
(AC-14) Permitted Actions without Identification or Authentication
(AC-15) Automated Marking
(AC-16) Security Attributes
(AC-17) Remote Access
(AC-18) Wireless Access Restrictions
(AC-19) Access Control for Mobile Devices
(AC-20) Use of External Information Systems
(AC-21) User Based Collaboration and Information Sharing
(AC-22) Publicly Accessible Content

(AU) Audit and Accountability
(AU-01) Audit and Accountability Policy and Procedures
(AU-02) Auditable Events
(AU-03) Content of Audit Records
(AU-04) Audit Storage Capacity
(AU-05) Response to Audit Processing Failures
(AU-06) Audit Monitoring, Analysis, and Reporting
(AU-07) Audit Reduction and Report Generation
(AU-08) Time Stamps
(AU-09) Protection of Audit Information
(AU-10) Non-repudiation
(AU-11) Audit Record Retention
(AU-12) Audit Generation
(AU-13) Monitoring for Information Disclosure
(AU-14) Session Audit
(AU-3, AC-22)

(IA) Identification and Authentication
(IA-01) Identification and Authentication Policy and Procedures
(IA-02) User Identification and Authentication (Organizational Users)
(IA-03) Device Identification and Authentication
(IA-04) Identifier Management
(IA-05) Authenticator Management
(IA-06) Authenticator Feedback
(IA-07) Cryptographic Module Authentication
(IA-08) Identification and Authentication (Non-Organizational Users)

(SC) System and Communications Protection
(SC-01) System and Communications Protection Policy and Procedures
(SC-02) Application Partitioning
(SC-03) Security Function Isolation
(SC-04) Information in Shared Resources
(SC-05) Denial of Service Protection
(SC-06) Resource Priority
(SC-07) Boundary Protection
(SC-08) Transmission Integrity
(SC-09) Transmission Confidentiality
(SC-10) Network Disconnect
(SC-11) Trusted Path
(SC-12) Cryptographic Key Establishment and Management
(SC-13) Use of Cryptography
(SC-14) Public Access Protections
(SC-15) Collaborative Computing
(SC-16) Transmission of Security Attributes
(SC-17) Public Key Infrastructure Certificates
(SC-18) Mobile Code
(SC-19) Voice Over Internet Protocol
(SC-20) Secure Name/Address Resolution Service (Authoritative Source)
(SC-21) Secure Name/Address Resolution Service (Recursive or Caching Resolver)
(SC-22) Architecture and Provisioning for Name/Address Resolution Service
(SC-23) Session Authenticity
(SC-24) Fail in Known State
(SC-25) Thin Nodes
(SC-26) Honeypots
(SC-27) Operating System-Independent Applications
(SC-28) Protection of Information at Rest
(SC-29) Heterogeneity
(SC-30) Virtualization Techniques
(SC-31) Covert Channel Analysis
(SC-32) Information System Partitioning
(SC-33) Transmission Preparation Integrity