NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
NIST SP 800-53 rev 3 - Recommended Security Controls for Federal Information Systems
on Tuesday 06 December 2011 print the content item {PDF=create pdf file of the content item^plugin:content.18}
in NIST.gov Publications > Special Publications - SP 800 series

The purpose of this publication is to provide guidelines for selecting and specifying security controls for information systems supporting the executive agencies of the federal government. The guidelines apply to all components of an information system that process, store, or transmit federal information. The SP 800-53 guidelines were developed to help achieve more secure information systems within the federal government.

Download NIST Special Publication 800-53 Revision 3. Errata as of May 1, 2010

Please use the NIST.org Forum to ask questions or discuss this document. Members can use the comment link below for short comments about this publication.



The SP 800-53 rev. 3 document was created by the National Institute of Standards and Technology and is public domain (not subject to copyright).


(The below SP 800-53 rev.3 description is from NIST.gov, edited)

The implementation of appropriate security controls for an information system is an important task that can have major implications on the operations and assets of an organization. Security controls are the management, operational, and technical safeguards or countermeasures prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. There are several important questions that should be answered by organizational officials when addressing the security considerations for their information systems:

  • What security controls are needed to adequately protect the information systems that support the operations and assets of the organization in order to accomplish its assigned mission, protect its assets, fulfill its legal responsibilities, maintain its day-to-day functions, and protect individuals?
  • Have the selected security controls been implemented or is there a realistic plan for their implementation?
  • What is the desired or required level of assurance (i.e., grounds for confidence) that the selected security controls, as implemented, are effective3 in their application?


An effective IT security program should include:
  • Periodic assessments of risk, including the magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization;
  • Policies and procedures that are based on risk assessments, cost-effectively reduce information security risks to an acceptable level, and ensure that information security is addressed throughout the life cycle of each organizational information system;
  • Subordinate plans for providing adequate information security for networks, facilities, information systems, or groups of information systems, as appropriate;
  • Security awareness training to inform personnel (including contractors and other users of information systems that support the operations and assets of the organization) of the information security risks associated with their activities and their responsibilities in complying with organizational policies and procedures designed to reduce these risks;
  • Periodic testing and evaluation of the effectiveness of information security policies, procedures, practices, and security controls to be performed with a frequency depending on risk, but no less than annually;
  • A process for planning, implementing, evaluating, and documenting remedial actions to address any deficiencies in the information security policies, procedures, and practices of the organization;
  • Procedures for detecting, reporting, and responding to security incidents; and
  • Plans and procedures to ensure continuity of operations for information systems that support the operations and assets of the organization.


It is of paramount importance that responsible individuals within the organization understand the risks and other factors that could adversely affect their operations and assets. Moreover, these officials must understand the current status of their security programs and the security controls planned or in place to protect their information systems in order to make informed judgments and investments that appropriately mitigate risks to an acceptable level. The ultimate objective is to conduct the day-to-day operations of the organization and to accomplish the organization’s stated missions with what the Office of Management and Budget (OMB) Circular A-130 defines as adequate security, or security commensurate with risk, including the magnitude of harm resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of information.



NIST Special Publication # 800-53
Publication Date 1 May 2010


Translate to: French German Italian Spanish Portuguese GTM_LAN_DUTCH Russian Chinese Arabic Korean English
Google Ads




Headlines

»CVE-2003-1604
The redirect_target function in net/ipv4/netfilter/ipt_REDIRECT.c in the Linux kernel before 2.6.0 a ...
»CVE-2008-7316
mm/filemap.c in the Linux kernel before 2.6.25 allows local users to cause a denial of service (infi ...
»CVE-2011-5321
The tty_open function in drivers/tty/tty_io.c in the Linux kernel before 3.1.1 mishandles a driver-l ...
»CVE-2012-6689
The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not v ...
»CVE-2012-6701
Integer overflow in fs/aio.c in the Linux kernel before 3.4.1 allows local users to cause a denial o ...
»CVE-2014-9717
fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without ve ...
»CVE-2015-1350
The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr ope ...
»CVE-2015-1573
The nft_flush_table function in net/netfilter/nf_tables_api.c in the Linux kernel before 3.18.5 mish ...
»CVE-2015-2672
The xsave/xrstor implementation in arch/x86/include/asm/xsave.h in the Linux kernel before 3.19.2 cr ...
»CVE-2015-2686
net/socket.c in the Linux kernel 3.19 before 3.19.3 does not validate certain range data for (1) sen ...
»CVE-2015-4170
Race condition in the ldsem_cmpxchg function in drivers/tty/tty_ldsem.c in the Linux kernel before 3 ...
»CVE-2015-4176
fs/namespace.c in the Linux kernel before 4.0.2 does not properly support mount connectivity, which ...
»CVE-2015-4177
The collect_mounts function in fs/namespace.c in the Linux kernel before 4.0.5 does not properly con ...
»CVE-2015-4178
The fs_pin implementation in the Linux kernel before 4.0.5 does not ensure the internal consistency ...
»CVE-2015-8019
The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel 3.14.54 and ...


Date published: 2016-05-03T04:50:00Z
Details

»FBI Releases Article on Ransomware
Original release date: April 29, 2016 The Federal Bureau of Investigation (FBI) has released ...
»Google Releases Security Update for Chrome
Original release date: April 28, 2016 Google has released Chrome version 50.0.2661.94 to addr ...
»Mozilla Releases Security Updates
Original release date: April 26, 2016 Mozilla has released security updates to address multip ...
»FTC Releases Alert on Earthquake Disaster Email Scams
Original release date: April 20, 2016 The Federal Trade Commission (FTC) has released an aler ...
»Cisco Releases Security Updates
Original release date: April 20, 2016 Cisco has released security updates to address vulnerab ...
»Oracle Releases Security Bulletin
Original release date: April 19, 2016 Oracle has released its Critical Patch Update for April ...
»Symantec Releases Security Updates
Original release date: April 19, 2016 Symantec has released security updates to address vulne ...
»VMWare Releases Security Updates
Original release date: April 14, 2016 VMware has released security updates to address a vulne ...
»IRS Warns Taxpayers About Scams as Tax Deadline Approaches
Original release date: April 13, 2016 The Internal Revenue Service (IRS) has issued a press r ...
»Google Releases Security Update for Chrome
Original release date: April 13, 2016 Google has released Chrome version 50.0.2661.75 to addr ...


Date published: not known
Details

»Paper: How It Works: Steganography Hides Malware in Image Files
A new paper by CYREN researcher Lordian Mosuela takes a close look ...
»Paying a malware ransom is bad, but telling people to never do it is unhelpful advice
The current ransomware plague is one of the worst threats the Inter ...
»VB2015 paper: VolatilityBot: Malicious Code Extraction Made by and for Security Researchers
In his VB2015 paper, Martin Korman presented his 'VolatilyBot' tool ...
»VB2016 programme announced, registration opened
We have announced 37 papers (and four reserve papers) that will be ...
»New tool helps ransomware victims indentify the malware family
The people behind the MalwareHunterTeam have released a tool that h ...
»It's fine for vulnerabilities to have names — we just need not to take them too seriously
The PR campaign around the Badlock vulnerability backfired when it ...
»Blog Throwback Thursday: The Number of the Beasts
The Virus Bulletin Virus Prevalence Table, which ran from 1992 unti ...
»Paper: All Your Meetings Are Belong to Us: Remote Code Execution in Apache OpenMeetings
Security researcher Andreas Lindh recently found a vulnerability in ...
»Throwback Thursday: 'In the Beginning was the Word...'
Word and Excel’s internal file formats used to be something in whic ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» FBI Releases Article on Ransomware
[29 Apr 2016 07:45pm]

» Google Releases Security Update for Chrome
[28 Apr 2016 06:31pm]

» Mozilla Releases Security Updates
[26 Apr 2016 12:53pm]

» FTC Releases Alert on Earthquake Disaster Email Scams
[20 Apr 2016 03:05pm]

» Cisco Releases Security Updates
[20 Apr 2016 11:12am]

» Oracle Releases Security Bulletin
[19 Apr 2016 02:33pm]

» Symantec Releases Security Updates
[19 Apr 2016 11:30am]

» VMWare Releases Security Updates
[14 Apr 2016 07:08pm]

» IRS Warns Taxpayers About Scams as Tax Deadline Approaches
[13 Apr 2016 04:42pm]

» Google Releases Security Update for Chrome
[13 Apr 2016 03:18pm]

***
US-CERT Alerts

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

» TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations
[01 Aug 2015 04:01pm]

» TA15-195A: Adobe Flash and Microsoft Windows Vulnerabilities
[14 Jul 2015 05:13pm]

» TA15-120A: Securing End-to-End Communications
[29 Apr 2015 10:00pm]

» TA15-119A: Top 30 Targeted High Risk Vulnerabilities
[28 Apr 2015 10:00pm]

***
Computerworld Security

» WhatsApp blocked in Brazil again -- stupidity knows no limit
[03 May 2016 05:39am]

» Nadella explains why Microsoft sued the U.S. government
[02 May 2016 06:26pm]

» CIOs: Match security plans to your company's 'risk appetite'
[02 May 2016 12:45pm]

» Hack a car in Michigan, go to prison for life if new bill becomes law
[02 May 2016 12:44pm]

» Microsoft to begin SHA-1 crypto shutoff with Windows 10's summer upgrade
[02 May 2016 08:03am]

» IDG Contributor Network: PCI's new rules focus on the chiefs
[02 May 2016 05:00am]

» Qatar National Bank claims customer data released by hackers is authentic
[02 May 2016 04:22am]

» It's Monday. Do you know where your users are?
[02 May 2016 04:00am]

» FBI uses 5th-Amendment loophole to unlock iPhone of Bkhchadzhyan
[02 May 2016 01:20am]

» IBM offers advice on how to secure blockchain in the cloud
[29 Apr 2016 11:33am]

» Phishing apps posing as popular payment services infiltrate Google Play
[29 Apr 2016 09:44am]

» Toy maker's website pushed growing ransomware threat
[29 Apr 2016 08:43am]

» Supreme Court approves rule change that expands FBI computer search powers
[29 Apr 2016 04:14am]

» Devs leak Slack access tokens on GitHub, put sensitive business data at risk
[28 Apr 2016 11:53am]

» Estonian man gets 7 years in prison for role in global DNS hijacking botnet
[28 Apr 2016 09:58am]

***
Microsoft Security Advisories

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 01:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 12:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 12:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 12:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 12:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 12:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 12:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 12:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 12:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 12:00am]

» 3108638 - Update for Windows Hyper-V to Address CPU Weakness - Version: 1.0
[10 Nov 2015 12:00am]

» 3097966 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 2.0
[13 Oct 2015 01:00am]

» 3042058 - Update to Default Cipher Suite Priority Order - Version: 1.1
[13 Oct 2015 01:00am]

» 2960358 - Update for Disabling RC4 in .NET TLS - Version: 2.0
[13 Oct 2015 01:00am]

» 3083992 - Update to Improve AppLocker Publisher Rule Enforcement - Version: 1.0
[08 Sep 2015 01:00am]

***
WIRED

» The Future of Encryption Is in These Politicians’ Hands
[03 May 2016 05:00am]

» How Craig Wright Privately ‘Proved’ He Created Bitcoin
[02 May 2016 11:44am]

» Flaws in Samsung’s ‘Smart’ Home Let Hackers Unlock Doors and Set Off Fire Alarms
[02 May 2016 05:00am]

» Security News This Week: The FBI Gets Creative to Avoid Disclosing Its $1M iPhone Hack
[30 Apr 2016 05:00am]

» It May Soon Be a Lot Harder for the Law to Get Into Your Email
[29 Apr 2016 01:18pm]

» We’re Going HTTPS: Here’s How WIRED Is Tackling a Huge Security Upgrade
[28 Apr 2016 10:00am]

» The Critical Hole at the Heart of Our Cell Phone Networks
[28 Apr 2016 05:00am]

» Hacker Lexicon: What Is HTTPS?
[27 Apr 2016 08:00am]

» Two Tips to Keep Your Phone’s Encrypted Messages Encrypted
[26 Apr 2016 07:00am]

» Hack Brief: Site for ‘Beautiful’ People Suffers Ugly Million-Member Breach
[25 Apr 2016 12:38pm]

***
Network World Security

» Why your iPhone-unlocking fingerprint is susceptible to FBI search warrants
[03 May 2016 05:59am]

» Why you need DRM for your documents
[03 May 2016 05:48am]

» That printer in the corner is still a threat
[03 May 2016 05:46am]

» The IoT company behind the curtain
[03 May 2016 04:08am]

» What users love (and hate) about 4 leading firewall solutions
[25 Apr 2016 01:48pm]

» 10 no-cost home security mobile apps worth a download
[01 Apr 2016 06:39am]

» 7 VPN services for hotspot protection
[14 Mar 2016 04:00am]

» Review: Consider VPN services for hotspot protection
[14 Mar 2016 04:00am]

» Review: 5 application security testing tools compared
[01 Mar 2016 01:29pm]

» Skyport eases the pain of deploying and securing remote servers
[29 Feb 2016 04:00am]

» Review: 8 password managers for Windows, Mac OS X, iOS, and Android
[24 Feb 2016 05:58am]

» What users love (and hate) about 4 leading identity management tools
[22 Feb 2016 06:52am]

» REVIEW: Cyphort makes advanced threat protection easier than ever
[25 Jan 2016 04:00am]

» Microsoft's CEO explains why his company sued the U.S. government
[02 May 2016 06:26pm]

» Microsoft to begin SHA-1 crypto shutoff with Windows 10's summer upgrade
[02 May 2016 11:12am]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Symantec News

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}