NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
NIST SP 800-53 rev 3 - Recommended Security Controls for Federal Information Systems
on Tuesday 06 December 2011 print the content item {PDF=create pdf file of the content item^plugin:content.18}
in NIST.gov Publications > Special Publications - SP 800 series

The purpose of this publication is to provide guidelines for selecting and specifying security controls for information systems supporting the executive agencies of the federal government. The guidelines apply to all components of an information system that process, store, or transmit federal information. The SP 800-53 guidelines were developed to help achieve more secure information systems within the federal government.

Download NIST Special Publication 800-53 Revision 3. Errata as of May 1, 2010

Please use the NIST.org Forum to ask questions or discuss this document. Members can use the comment link below for short comments about this publication.



The SP 800-53 rev. 3 document was created by the National Institute of Standards and Technology and is public domain (not subject to copyright).


(The below SP 800-53 rev.3 description is from NIST.gov, edited)

The implementation of appropriate security controls for an information system is an important task that can have major implications on the operations and assets of an organization. Security controls are the management, operational, and technical safeguards or countermeasures prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. There are several important questions that should be answered by organizational officials when addressing the security considerations for their information systems:

  • What security controls are needed to adequately protect the information systems that support the operations and assets of the organization in order to accomplish its assigned mission, protect its assets, fulfill its legal responsibilities, maintain its day-to-day functions, and protect individuals?
  • Have the selected security controls been implemented or is there a realistic plan for their implementation?
  • What is the desired or required level of assurance (i.e., grounds for confidence) that the selected security controls, as implemented, are effective3 in their application?


An effective IT security program should include:
  • Periodic assessments of risk, including the magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization;
  • Policies and procedures that are based on risk assessments, cost-effectively reduce information security risks to an acceptable level, and ensure that information security is addressed throughout the life cycle of each organizational information system;
  • Subordinate plans for providing adequate information security for networks, facilities, information systems, or groups of information systems, as appropriate;
  • Security awareness training to inform personnel (including contractors and other users of information systems that support the operations and assets of the organization) of the information security risks associated with their activities and their responsibilities in complying with organizational policies and procedures designed to reduce these risks;
  • Periodic testing and evaluation of the effectiveness of information security policies, procedures, practices, and security controls to be performed with a frequency depending on risk, but no less than annually;
  • A process for planning, implementing, evaluating, and documenting remedial actions to address any deficiencies in the information security policies, procedures, and practices of the organization;
  • Procedures for detecting, reporting, and responding to security incidents; and
  • Plans and procedures to ensure continuity of operations for information systems that support the operations and assets of the organization.


It is of paramount importance that responsible individuals within the organization understand the risks and other factors that could adversely affect their operations and assets. Moreover, these officials must understand the current status of their security programs and the security controls planned or in place to protect their information systems in order to make informed judgments and investments that appropriately mitigate risks to an acceptable level. The ultimate objective is to conduct the day-to-day operations of the organization and to accomplish the organization’s stated missions with what the Office of Management and Budget (OMB) Circular A-130 defines as adequate security, or security commensurate with risk, including the magnitude of harm resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of information.



NIST Special Publication # 800-53
Publication Date 1 May 2010


Translate to: French German Italian Spanish Portuguese GTM_LAN_DUTCH Russian Chinese Arabic Korean English
Google Ads




Headlines

»CVE-2013-4312
The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial ...
»CVE-2014-9757
The Ignite Realtime Smack XMPP API, as used in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0, allows remote configured XMPP servers to execute arbitrary Java code via serialized data in an XMPP message.
»CVE-2015-2012
The MQXR service in WMQ Telemetry in IBM WebSphere MQ 7.1 before 7.1.0.7, 7.5 through 7.5.0.5, and 8 ...
»CVE-2015-3251
Apache CloudStack before 4.5.2 might allow remote authenticated administrators to obtain sensitive p ...
»CVE-2015-3252
Apache CloudStack before 4.5.2 does not properly preserve VNC passwords when migrating KVM virtual m ...
»CVE-2015-6398
Cisco Nexus 9000 Application Centric Infrastructure (ACI) Mode switches with software before 11.0(1c ...
»CVE-2015-7513
arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state ...
»CVE-2015-7550
The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not pro ...
»CVE-2015-7566
The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows ph ...
»CVE-2015-7675
The "Send as attachment" feature in Ipswitch MOVEit DMZ before 8.2 and MOVEit Mobile before 1.2.2 al ...
»CVE-2015-7677
The MOVEitISAPI service in Ipswitch MOVEit DMZ before 8.2 provides different error messages dependin ...
»CVE-2015-7678
Multiple cross-site request forgery (CSRF) vulnerabilities in Ipswitch MOVEit Mobile 1.2.0.962 and e ...
»CVE-2015-7679
Cross-site scripting (XSS) vulnerability in Ipswitch MOVEit Mobile before 1.2.2 allows remote attack ...
»CVE-2015-7680
Ipswitch MOVEit DMZ before 8.2 provides different error messages for authentication attempts dependi ...
»CVE-2015-7914
Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 allows remote attackers to bypass authentication by ...


Date published: 2016-02-10T23:20:00Z
Details

»Cisco Releases Security Update
Original release date: February 10, 2016 Cisco has released a security update to address a vu ...
»Microsoft Releases February 2016 Security Bulletin
Original release date: February 09, 2016 Microsoft has released 13 updates to address vulnera ...
»Google Releases Security Update for Chrome
Original release date: February 09, 2016 Google has released Chrome version 48.0.2564.109 to ...
»Adobe Releases Security Updates
Original release date: February 09, 2016 Adobe has released security updates to address vulne ...
»Oracle Releases Security Updates for Java
Original release date: February 08, 2016 Oracle has released security updates to address a vu ...
»Comodo Chromodo Browsers Vulnerable to Cross-Domain Attacks
Original release date: February 04, 2016 Some Comodo Chromodo browser versions (45.8.12.392, ...
»WordPress Releases Security Update
Original release date: February 02, 2016 WordPress 4.4.1 and prior versions contain two secur ...
»FTC Announces Enhancements to IdentityTheft.gov
Original release date: January 29, 2016 The Federal Trade Commission (FTC) has upgraded its I ...
»OpenSSL Releases Security Advisory
Original release date: January 28, 2016 OpenSSL versions 1.0.2f and 1.0.1r have been released ...
»Cisco Releases Security Update
Original release date: January 27, 2016 Cisco has released a security update to address a vul ...


Date published: not known
Details

»Welcome to virusbulletin.com
Almost 20 years after Virus Bulletin revealed its first site on the "world wide web", we've redesign ...
»VB2015 video: TurlaSat: The Fault in our Stars
In a presentation at VB2015 in Prague, Kaspersky Lab researcher Kurt Baumgartner talked about Turla' ...
»Security vendors should embrace those hunting bugs in their products
When interviewed by the Risky Business podcast last week, VB Editor Martijn Grooten talked about the ...
»More VB Conference papers and videos published
More VB2014 Conference papers and videos published - 11 papers and 9 videos added to our website....
»Throwback Thursday: Peter-II - Three Questions of The Sphinx
This Throwback Thursday, VB heads back to 1993, when an ordinary memory-resident master boot sector ...
»VB2015 paper: Effectively testing APT defences
Simon Edwards discusses how to test the potentially untestable....
»VB2015 paper: The ethics and perils of APT research: an unexpected transition into intelligence brokerage
Juan Andrés Guerrero-Saade discusses the perils and ethical conundrums that arise as the industry en ...
»VB2015 paper: Digital 'Bian Lian' (face changing): the Skeleton Key malware
Microsoft, Dell SecureWorks researchers analyse malware targeting Active Directory servers....
»Throwback Thursday: I say Virus, You say Trojan
This Throwback Thursday, VB heads back to 1998 — a time when anti-virus vendors avoided tackling non ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» Cisco Releases Security Update
[10 Feb 2016 10:17am]

» Microsoft Releases February 2016 Security Bulletin
[09 Feb 2016 03:44pm]

» Google Releases Security Update for Chrome
[09 Feb 2016 03:18pm]

» Adobe Releases Security Updates
[09 Feb 2016 11:01am]

» Oracle Releases Security Updates for Java
[08 Feb 2016 02:20pm]

» Comodo Chromodo Browsers Vulnerable to Cross-Domain Attacks
[04 Feb 2016 05:53pm]

» WordPress Releases Security Update
[02 Feb 2016 02:46pm]

» FTC Announces Enhancements to IdentityTheft.gov
[29 Jan 2016 03:36pm]

» OpenSSL Releases Security Advisory
[28 Jan 2016 02:11pm]

» Cisco Releases Security Update
[27 Jan 2016 03:40pm]

***
US-CERT Alerts

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

» TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations
[01 Aug 2015 04:01pm]

» TA15-195A: Adobe Flash and Microsoft Windows Vulnerabilities
[14 Jul 2015 05:13pm]

» TA15-120A: Securing End-to-End Communications
[29 Apr 2015 10:00pm]

» TA15-119A: Top 30 Targeted High Risk Vulnerabilities
[28 Apr 2015 10:00pm]

» TA15-105A: Simda Botnet
[15 Apr 2015 06:51am]

» TA15-103A: DNS Zone Transfer AXFR Requests May Leak Domain Information
[13 Apr 2015 01:36pm]

***
Computerworld Security

» Android root malware is widespread in third-party app stores
[10 Feb 2016 04:07pm]

» SAP slaps a patch on leaky factory software
[10 Feb 2016 09:06am]

» Microsoft fixes 36 flaws in IE, Edge, Office, Windows, .NET Framework
[10 Feb 2016 08:34am]

» Government may tap into your IoT gadgets and use your smart devices to spy on you
[10 Feb 2016 08:20am]

» Poseidon hacker group behind long-running extortion scheme
[10 Feb 2016 06:04am]

» Setting up a Windows 10 picture PIN
[10 Feb 2016 06:00am]

» U.S. regulator: A Google computer could qualify as car driver
[10 Feb 2016 05:51am]

» Google will stop accepting new Flash ads on June 30
[10 Feb 2016 05:18am]

» Identity thieves obtain 100,000 electronic filing PINs from IRS system
[10 Feb 2016 05:13am]

» IDG Contributor Network: Microsoft delivers major updates to Internet Explorer and Adobe Flash Player
[10 Feb 2016 04:54am]

» Google drives email users to up their Gmail security and privacy
[10 Feb 2016 04:15am]

» FBI Director entreats tech firms to release encrypted data used in crimes and terror
[09 Feb 2016 03:32pm]

» Twitter gets an assist in taking on trolls and bullies
[09 Feb 2016 12:30pm]

» Google adds warning to unencrypted emails
[09 Feb 2016 11:36am]

» DoJ fiddles while FBI & DHS burn (after trivial hack of U.S. employee data)
[09 Feb 2016 04:51am]

***
Microsoft Security Advisories

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 12:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 12:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 12:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 12:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 12:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 12:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 12:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 12:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 12:00am]

» 3108638 - Update for Windows Hyper-V to Address CPU Weakness - Version: 1.0
[10 Nov 2015 12:00am]

» 3097966 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 2.0
[13 Oct 2015 01:00am]

» 2960358 - Update for Disabling RC4 in .NET TLS - Version: 2.0
[13 Oct 2015 01:00am]

» 3042058 - Update to Default Cipher Suite Priority Order - Version: 1.1
[13 Oct 2015 01:00am]

» 3083992 - Update to Improve AppLocker Publisher Rule Enforcement - Version: 1.0
[08 Sep 2015 01:00am]

» 3074162 - Vulnerability in Microsoft Malicious Software Removal Tool Could Allow Elevation of Privilege - Version: 1.0
[14 Jul 2015 01:00am]

***
WIRED » Security

» New Bill Aims to Stop State-Level Decryption Before It Starts
[10 Feb 2016 01:27pm]

» Obama’s Cybersecurity Plan is Meant to Secure His Legacy
[10 Feb 2016 05:00am]

» How to Hack the Power Grid Through Home Air Conditioners
[09 Feb 2016 08:40am]

» Donate Your Old USB Drives to Fight North Korean Brainwashing
[09 Feb 2016 07:00am]

» Obama’s New Cybersecurity Plan Sticks to the Most Basic Basics
[09 Feb 2016 03:01am]

» Hack Brief: Hacker Leaks the Info of Thousands of FBI and DHS Employees
[08 Feb 2016 01:33pm]

» It’s Been 20 Years Since This Man Declared Cyberspace Independence
[08 Feb 2016 07:58am]

» Take a Trip to a Time When Viruses Still Called You Names
[08 Feb 2016 05:00am]

» Security News This Week: The White House Bans Its Own Security Researcher
[06 Feb 2016 05:00am]

» Julian Assange’s 3.5-Year Detainment in Embassy Ruled Unlawful
[05 Feb 2016 01:27am]

***
Network World Security

» Android root malware widespread in third-party app stores
[10 Feb 2016 04:07pm]

» Bill filed in Congress would ban encryption backdoors
[10 Feb 2016 01:37pm]

» U.S. intelligence chief touts IoT as a spying opportunity
[10 Feb 2016 01:18pm]

» Don't touch the malware at this museum
[10 Feb 2016 01:15pm]

» REVIEW: Cyphort makes advanced threat protection easier than ever
[25 Jan 2016 04:00am]

» Two network video cameras raise the bar for home security
[19 Jan 2016 12:20pm]

» FidSafe: A cloud service for important documents (and the price is right)
[15 Jan 2016 06:23pm]

» Best open source email security products
[11 Jan 2016 04:00am]

» REVIEW: MailScanner and ScrolloutF1 are standouts in open source email security
[11 Jan 2016 04:00am]

» Piper nv: An ambitious home monitoring and automation system
[09 Jan 2016 04:09pm]

» Sentri wants to guard your home but isn't very good at it yet
[20 Dec 2015 04:11pm]

» Dog and Bone LockSmart: The padlock rethought
[19 Dec 2015 12:53pm]

» Review: Best password managers for the enterprise
[07 Dec 2015 04:00am]

» Bill filed in Congress would ban encryption backdoors
[10 Feb 2016 01:37pm]

» Underhanded C contest winner's code fools nuke inspectors into destroying fake nukes
[10 Feb 2016 12:09pm]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Symantec News

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}