Security Controls Taxonomy

Introduction

The security pattern templates and ‘How To’ guide use NIST Special Publication 800-53 (Rev. 5) for the baseline list of Security Controls.

Version 5 has been used (rather than Version 4) given the improved updates made to the taxonomy list.

References

Below is the summary list of security controls currently published for 800-53 (Rev. 5)

Security Controls List

Control Identifier Control or Control Name
AC-01 Policy and Procedures
AC-02 Account Management
AC-03 Access Enforcement
AC-04 Information Flow Enforcement
AC-05 Separation of Duties
AC-06 Least Privilege
AC-07 Unsuccessful Logon Attempts
AC-08 System Use Notification
AC-09 Previous Logon Notification
AC-10 Concurrent Session Control
AC-11 Device Lock
AC-12 Session Termination
AC-13 Supervision and Review - Access Control
AC-14 Permitted Actions Without Identification or Authentication
AC-15 Automated Marking
AC-16 Security and Privacy Attributes
AC-17 Remote Access
AC-18 Wireless Access
AC-19 Access Control for Mobile Devices
AC-20 Use of External Systems
AC-21 Information Sharing
AC-22 Publicly Accessible Content
AC-23 Data Mining Protection
AC-24 Access Control Decisions
AC-25 Reference Monitor
AT-01 Policy and Procedures
AT-02 Awareness Training
AT-03 Role-based Training
AT-04 Training Records
AT-05 Contacts with Security Groups and Associations
AU-01 Policy and Procedures
AU-02 Event Logging
AU-03 Content of Audit Records
AU-04 Audit Log Storage Capacity
AU-05 Response to Audit Logging Process Failures
AU-06 Audit Record Review, Analysis, and Reporting
AU-07 Audit Record Reduction and Report Generation
AU-08 Time Stamps
AU-09 Protection of Audit Information
AU-10 Non-repudiation
AU-11 Audit Record Retention
AU-12 Audit Record Generation
AU-13 Monitoring for Information Disclosure
AU-14 Session Audit
AU-15 Alternate Audit Logging Capability
AU-16 Cross-organizational Audit Logging
CA-01 Policy and Procedures
CA-02 Control Assessments
CA-03 Information Exchange
CA-04 Security Certification
CA-05 Plan of Action and Milestones
CA-06 Authorization
CA-07 Continuous Monitoring
CA-08 Penetration Testing
CA-09 Internal System Connections
CM-01 Policy and Procedures
CM-02 Baseline Configuration
CM-03 Configuration Change Control
CM-04 Impact Analyses
CM-05 Access Restrictions for Change
CM-06 Configuration Settings
CM-07 Least Functionality
CM-08 System Component Inventory
CM-09 Configuration Management Plan
CM-10 Software Usage Restrictions
CM-11 User-installed Software
CM-12 Information Location
CM-13 Data Action Mapping
CP-01 Policy and Procedures
CP-02 Contingency Plan
CP-03 Contingency Training
CP-04 Contingency Plan Testing
CP-05 Contingency Plan Update
CP-06 Alternate Storage Site
CP-07 Alternate Processing Site
CP-08 Telecommunications Services
CP-09 System Backup
CP-10 System Recovery and Reconstitution
CP-11 Alternate Communications Protocols
CP-12 Safe Mode
CP-13 Alternative Security Mechanisms
CP-14 Self-challenge
IA-01 Policy and Procedures
IA-02 Identification and Authentication (organizational Users)
IA-03 Device Identification and Authentication
IA-04 Identifier Management
IA-05 Authenticator Management
IA-06 Authenticator Feedback
IA-07 Cryptographic Module Authentication
IA-08 Identification and Authentication (non-organizational Users)
IA-09 Service Identification and Authentication
IA-10 Adaptive Authentication
IA-11 Re-authentication
IA-12 Identity Proofing
IR-01 Policy and Procedures
IR-02 Incident Response Training
IR-03 Incident Response Testing
IR-04 Incident Handling
IR-05 Incident Monitoring
IR-06 Incident Reporting
IR-07 Incident Response Assistance
IR-08 Incident Response Plan
IR-09 Information Spillage Response
IR-10 Incident Analysis
MA-01 Policy and Procedures
MA-02 Controlled Maintenance
MA-03 Maintenance Tools
MA-04 Nonlocal Maintenance
MA-05 Maintenance Personnel
MA-06 Timely Maintenance
MA-07 Field Maintenance
MP-01 Policy and Procedures
MP-02 Media Access
MP-03 Media Marking
MP-04 Media Storage
MP-05 Media Transport
MP-06 Media Sanitization
MP-07 Media Use
MP-08 Media Downgrading
PE-01 Policy and Procedures
PE-02 Physical Access Authorizations
PE-03 Physical Access Control
PE-04 Access Control for Transmission
PE-05 Access Control for Output Devices
PE-06 Monitoring Physical Access
PE-07 Visitor Control
PE-08 Visitor Access Records
PE-09 Power Equipment and Cabling
PE-10 Emergency Shutoff
PE-11 Emergency Power
PE-12 Emergency Lighting
PE-13 Fire Protection
PE-14 Environmental Controls
PE-15 Water Damage Protection
PE-16 Delivery and Removal
PE-17 Alternate Work Site
PE-18 Location of System Components
PE-19 Information Leakage
PE-20 Asset Monitoring and Tracking
PE-21 Electromagnetic Pulse Protection
PE-22 Component Marking
PE-23 Facility Location
PL-01 Policy and Procedures
PL-02 System Security and Privacy Plans
PL-03 System Security Plan Update
PL-04 Rules of Behavior
PL-05 Privacy Impact Assessment
PL-06 Security-related Activity Planning
PL-07 Concept of Operations
PL-08 Security and Privacy Architectures
PL-09 Central Management
PL-10 Baseline Selection
PL-11 Baseline Tailoring
PM-01 Information Security Program Plan
PM-02 Information Security Program Leadership Role
PM-03 Information Security and Privacy Resources
PM-04 Plan of Action and Milestones Process
PM-05 System Inventory
PM-06 Measures of Performance
PM-07 Enterprise Architecture
PM-08 Critical Infrastructure Plan
PM-09 Risk Management Strategy
PM-10 Authorization Process
PM-11 Mission and Business Process Definition
PM-12 Insider Threat Program
PM-13 Security and Privacy Workforce
PM-14 Testing, Training, and Monitoring
PM-15 Security and Privacy Groups and Associations
PM-16 Threat Awareness Program
PM-17 Protecting Controlled Unclassified Information on External Systems
PM-18 Privacy Program Plan
PM-19 Privacy Program Leadership Role
PM-20 Dissemination of Privacy Program Information
PM-21 Accounting of Disclosures
PM-22 Personally Identifiable Information Quality Management
PM-23 Data Governance Body
PM-24 Data Integrity Board
PM-25 Minimization of Pii Used in Testing, Training, and Research
PM-26 Complaint Management
PM-27 Privacy Reporting
PM-28 Risk Framing
PM-29 Risk Management Program Leadership Roles
PM-30 Supply Chain Risk Management Strategy
PM-31 Continuous Monitoring Strategy
PM-32 Purposing
PM-33 Privacy Policies on Websites, Applications, and Digital Services
PS-01 Policy and Procedures
PS-02 Position Risk Designation
PS-03 Personnel Screening
PS-04 Personnel Termination
PS-05 Personnel Transfer
PS-06 Access Agreements
PS-07 External Personnel Security
PS-08 Personnel Sanctions
PT-01 Policy and Procedures
PT-02 Authority to Process Personally Identifiable Information
PT-03 Personally Identifiable Information Processing Purposes
PT-04 Minimization
PT-05 Consent
PT-06 Privacy Notice
PT-07 System of Records Notice
PT-08 Specific Categories of Personally Identifiable Information
PT-09 Computer Matching Requirements
RA-01 Policy and Procedures
RA-02 Security Categorization
RA-03 Risk Assessment
RA-04 Risk Assessment Update
RA-05 Vulnerability Monitoring and Scanning
RA-06 Technical Surveillance Countermeasures Survey
RA-07 Risk Response
RA-08 Privacy Impact Assessments
RA-09 Criticality Analysis
RA-10 Threat Hunting
SA-01 Policy and Procedures
SA-02 Allocation of Resources
SA-03 System Development Life Cycle
SA-04 Acquisition Process
SA-05 System Documentation
SA-06 Software Usage Restrictions
SA-07 User-installed Software
SA-08 Security and Privacy Engineering Principles
SA-09 External System Services
SA-10 Developer Configuration Management
SA-11 Developer Testing and Evaluation
SA-12 Supply Chain Protection
SA-13 Trustworthiness
SA-14 Criticality Analysis
SA-15 Development Process, Standards, and Tools
SA-16 Developer-provided Training
SA-17 Developer Security Architecture and Design
SA-18 Tamper Resistance and Detection
SA-19 Component Authenticity
SA-20 Customized Development of Critical Components
SA-21 Developer Screening
SA-22 Unsupported System Components
SA-23 Specialization
SC-01 Policy and Procedures
SC-02 Separation of System and User Functionality
SC-03 Security Function Isolation
SC-04 Information in Shared System Resources
SC-05 Denial of Service Protection
SC-06 Resource Availability
SC-07 Boundary Protection
SC-08 Transmission Confidentiality and Integrity
SC-09 Transmission Confidentiality
SC-10 Network Disconnect
SC-11 Trusted Path
SC-12 Cryptographic Key Establishment and Management
SC-13 Cryptographic Protection
SC-14 Public Access Protections
SC-15 Collaborative Computing Devices and Applications
SC-16 Transmission of Security and Privacy Attributes
SC-17 Public Key Infrastructure Certificates
SC-18 Mobile Code
SC-19 Voice Over Internet Protocol
SC-20 Secure Name/address Resolution Service (authoritative Source)
SC-21 Secure Name/address Resolution Service (recursive or Caching Resolver)
SC-22 Architecture and Provisioning for Name/address Resolution Service
SC-23 Session Authenticity
SC-24 Fail in Known State
SC-25 Thin Nodes
SC-26 Decoys
SC-27 Platform-independent Applications
SC-28 Protection of Information at Rest
SC-29 Heterogeneity
SC-30 Concealment and Misdirection
SC-31 Covert Channel Analysis
SC-32 System Partitioning
SC-33 Transmission Preparation Integrity
SC-34 Non-modifiable Executable Programs
SC-35 External Malicious Code Identification
SC-36 Distributed Processing and Storage
SC-37 Out-of-band Channels
SC-38 Operations Security
SC-39 Process Isolation
SC-40 Wireless Link Protection
SC-41 Port and I/O Device Access
SC-42 Sensor Capability and Data
SC-43 Usage Restrictions
SC-44 Detonation Chambers
SC-45 System Time Synchronization
SC-46 Cross Domain Policy Enforcement
SC-47 Communications Path Diversity
SC-48 Sensor Relocation
SC-49 Hardware-enforced Separation and Policy Enforcement
SC-50 Software-enforced Separation and Policy Enforcement
SC-51 Operational and Internet-based Technologies
SI-01 Policy and Procedures
SI-02 Flaw Remediation
SI-03 Malicious Code Protection
SI-04 System Monitoring
SI-05 Security Alerts, Advisories, and Directives
SI-06 Security and Privacy Function Verification
SI-07 Software, Firmware, and Information Integrity
SI-08 Spam Protection
SI-09 Information Input Restrictions
SI-10 Information Input Validation
SI-11 Error Handling
SI-12 Information Management and Retention
SI-13 Predictable Failure Prevention
SI-14 Non-persistence
SI-15 Information Output Filtering
SI-16 Memory Protection
SI-17 Fail-safe Procedures
SI-18 Personally Identifiable Information Quality Operations
SI-19 De-identification
SI-20 Tainting
SI-21 Information Refresh
SI-22 Information Diversity
SI-23 Information Fragmentation
SR-01 Policy and Procedures
SR-02 Supply Chain Risk Management Plan
SR-03 Supply Chain Controls and Processes
SR-04 Provenance
SR-05 Acquisition Strategies, Tools, and Methods
SR-06 Supplier Reviews
SR-07 Supply Chain Operations Security
SR-08 Notification Agreements
SR-09 Tamper Resistance and Detection
SR-10 Inspection of Systems or Components
SR-11 Component Authenticity