NIST Security and Privacy Controls for Information Systems and Organizations
10 Minutes read
NIST downloadable document and extensively outlining background, scoping, and implementation guidance in addition to the controls, assessment procedures, and baselines
Note that NIST Special Publication (SP) 800-53, Revision 5 contains additional background, scoping, and implementation guidance in addition to the controls and control enhancements.
This PDF is produced from OSCAL Source data and represents a derivative format of controls defined in NIST SP 800-53, Revision 5, Security and Privacy Controls for Information Systems and Organization. This version contains only the controls and control enhancements.
If there are any discrepancies noted in the content between this NIST SP 800-53, Revision 5 derivative data format and the latest published NIST SP 800-53, Revision 5 (normative), please contact sec-cert@nist.gov and refer to the official published documents.
This PDF is produced from OSCAL Source data and represents a derivative format of controls defined in NIST SP 800-53, Revision 5, Security and Privacy Controls for Information Systems and Organization. This version contains only the controls and control enhancements.
If there are any discrepancies noted in the content between this NIST SP 800-53, Revision 5 derivative data format and the latest published NIST SP 800-53, Revision 5 (normative), please contact sec-cert@nist.gov and refer to the official published documents.
Subscribe
Subscribe to be notified when new content you may be interested in is added.
Recommended Content
Presidio solution : Radically Simplified Data Management
Presidio solution : What is Endpoint Security?
Best practice : Selecting and Hardening Remote VPN Access Solutions
Best practice : Remote Vulnerability and Patch Management
Best practice : Printing While Working Remotely
Presidio solution : What is Zero-Trust Networking?
Presidio solution : What is a Next-Generation Firewall?
Best practice : Foundation of Zero Trust Pillars