NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
NIST SP 800-53 rev 3 - Recommended Security Controls for Federal Information Systems
on Tuesday 06 December 2011 print the content item {PDF=create pdf file of the content item^plugin:content.18}
in NIST.gov Publications > Special Publications - SP 800 series

The purpose of this publication is to provide guidelines for selecting and specifying security controls for information systems supporting the executive agencies of the federal government. The guidelines apply to all components of an information system that process, store, or transmit federal information. The SP 800-53 guidelines were developed to help achieve more secure information systems within the federal government.

Download NIST Special Publication 800-53 Revision 3. Errata as of May 1, 2010

Please use the NIST.org Forum to ask questions or discuss this document. Members can use the comment link below for short comments about this publication.



The SP 800-53 rev. 3 document was created by the National Institute of Standards and Technology and is public domain (not subject to copyright).


(The below SP 800-53 rev.3 description is from NIST.gov, edited)

The implementation of appropriate security controls for an information system is an important task that can have major implications on the operations and assets of an organization. Security controls are the management, operational, and technical safeguards or countermeasures prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. There are several important questions that should be answered by organizational officials when addressing the security considerations for their information systems:

  • What security controls are needed to adequately protect the information systems that support the operations and assets of the organization in order to accomplish its assigned mission, protect its assets, fulfill its legal responsibilities, maintain its day-to-day functions, and protect individuals?
  • Have the selected security controls been implemented or is there a realistic plan for their implementation?
  • What is the desired or required level of assurance (i.e., grounds for confidence) that the selected security controls, as implemented, are effective3 in their application?


An effective IT security program should include:
  • Periodic assessments of risk, including the magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization;
  • Policies and procedures that are based on risk assessments, cost-effectively reduce information security risks to an acceptable level, and ensure that information security is addressed throughout the life cycle of each organizational information system;
  • Subordinate plans for providing adequate information security for networks, facilities, information systems, or groups of information systems, as appropriate;
  • Security awareness training to inform personnel (including contractors and other users of information systems that support the operations and assets of the organization) of the information security risks associated with their activities and their responsibilities in complying with organizational policies and procedures designed to reduce these risks;
  • Periodic testing and evaluation of the effectiveness of information security policies, procedures, practices, and security controls to be performed with a frequency depending on risk, but no less than annually;
  • A process for planning, implementing, evaluating, and documenting remedial actions to address any deficiencies in the information security policies, procedures, and practices of the organization;
  • Procedures for detecting, reporting, and responding to security incidents; and
  • Plans and procedures to ensure continuity of operations for information systems that support the operations and assets of the organization.


It is of paramount importance that responsible individuals within the organization understand the risks and other factors that could adversely affect their operations and assets. Moreover, these officials must understand the current status of their security programs and the security controls planned or in place to protect their information systems in order to make informed judgments and investments that appropriately mitigate risks to an acceptable level. The ultimate objective is to conduct the day-to-day operations of the organization and to accomplish the organization’s stated missions with what the Office of Management and Budget (OMB) Circular A-130 defines as adequate security, or security commensurate with risk, including the magnitude of harm resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of information.



NIST Special Publication # 800-53
Publication Date 1 May 2010


Translate to: {GOOGLETRANS}
Google Ads




Headlines

»CVE-2012-1038 (networks_mobility_system_software)
Cross-site scripting (XSS) vulnerability in the WebAAA login functionality (wba_login.html) in Junip ...
»CVE-2012-2866 (chrome, opensuse)
Google Chrome before 21.0.1180.89 does not properly perform a cast of an unspecified variable during ...
»CVE-2012-2868 (chrome, opensuse)
Race condition in Google Chrome before 21.0.1180.89 allows remote attackers to cause a denial of ser ...
»CVE-2012-2869 (chrome, opensuse)
Google Chrome before 21.0.1180.89 does not properly load URLs, which allows remote attackers to caus ...
»CVE-2012-5108 (chrome)
Race condition in Google Chrome before 22.0.1229.92 allows remote attackers to execute arbitrary cod ...
»CVE-2012-5121 (chrome)
Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a ...
»CVE-2012-5122 (chrome)
Google Chrome before 23.0.1271.64 does not properly perform a cast of an unspecified variable during ...
»CVE-2012-5123 (chrome)
Skia, as used in Google Chrome before 23.0.1271.64, allows remote attackers to cause a denial of ser ...
»CVE-2012-5124 (chrome)
Google Chrome before 23.0.1271.64 does not properly handle textures, which allows remote attackers t ...
»CVE-2012-5126 (chrome)
Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a ...
»CVE-2012-5127 (chrome)
Integer overflow in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of s ...
»CVE-2012-5130 (chrome, opensuse)
Skia, as used in Google Chrome before 23.0.1271.91, allows remote attackers to cause a denial of ser ...
»CVE-2012-5136 (chrome, opensuse)
Google Chrome before 23.0.1271.91 does not properly perform a cast of an unspecified variable during ...
»CVE-2012-5137 (chrome, opensuse)
Use-after-free vulnerability in Google Chrome before 23.0.1271.95 allows remote attackers to cause a ...
»CVE-2012-5138 (chrome, opensuse)
Google Chrome before 23.0.1271.95 does not properly handle file paths, which has unspecified impact ...


Date published: 2016-09-30T04:50:20Z
Details

»Google Releases Security Update for Chrome
Original release date: September 30, 2016 Google has released Chrome version 53.0.2785.143 to ...
»Cisco Releases Security Updates
Original release date: September 28, 2016 Cisco has released security updates to address vuln ...
»ISC Releases Security Updates for BIND
Original release date: September 27, 2016 The Internet Systems Consortium (ISC) has released ...
»OpenSSL Releases Security Updates
Original release date: September 23, 2016 | Last revised: September 26, 2016 OpenSSL has rele ...
»FTC Releases Data Breach Recovery and Prevention Video
Original release date: September 22, 2016 The Federal Trade Commission (FTC) has released a s ...
»Drupal Releases Security Advisory
Original release date: September 21, 2016 Drupal has released an advisory to address vulnerab ...
»Cisco Releases Security Updates
Original release date: September 21, 2016 Cisco has released security updates to address vuln ...
»Mozilla Releases Security Updates
Original release date: September 20, 2016 Mozilla has released security updates to address mu ...
»Apple Releases Security Updates
Original release date: September 20, 2016 Apple has released security updates to address vuln ...
»Cisco Releases Security Updates
Original release date: September 16, 2016 Cisco has released security updates to address a vu ...


Date published: not known
Details

»“Cybersecurity is, at its core, a people problem,” says VB2016 keynote speaker
An interview with VB2016’s keynote speaker Christine Whalley - Dire ...
»Throwback Thursday: Following the Breadcrumbs
In 1999, Christine Orshesky described how one large organization de ...
»VB2016 preview: Cryptography mistakes in malware
At VB2016, two talks will discuss mistakes made by malware authors ...
»GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016
Next month at VB2016, HPE Security's Oleg Petrovsky will speak abou ...
»BSides Denver: Join and Support the Security Community
If you are coming to VB2016 in Denver, why not spend an extra day i ...
»VB2016 'Last-Minute' Papers Announced
We are excited to announce the addition of the "last-minute ...
»VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka
In a VB2016 paper, Stormshield researchers Benoit Ancel and Mehdi T ...
»Paper: Behavioural Detection and Prevention of Malware on OS X
In a new paper published through Virus Bulletin, Vincent Van Mieghe ...
»VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!
At VB2016, four researcher from Bitdefender will present a paper in ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» Google Releases Security Update for Chrome
[30 Sep 2016 10:35am]

» Cisco Releases Security Updates
[28 Sep 2016 07:00pm]

» ISC Releases Security Updates for BIND
[27 Sep 2016 02:31pm]

» OpenSSL Releases Security Updates
[23 Sep 2016 01:13pm]

» FTC Releases Data Breach Recovery and Prevention Video
[22 Sep 2016 11:21am]

» Drupal Releases Security Advisory
[21 Sep 2016 06:49pm]

» Cisco Releases Security Updates
[21 Sep 2016 06:36pm]

» Mozilla Releases Security Updates
[20 Sep 2016 03:02pm]

» Apple Releases Security Updates
[20 Sep 2016 01:56pm]

» Cisco Releases Security Updates
[16 Sep 2016 07:31pm]

***
US-CERT Alerts

» TA16-250A: The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations
[06 Sep 2016 04:29pm]

» TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities
[05 Jul 2016 08:50am]

» TA16-144A: WPAD Name Collision Vulnerability
[23 May 2016 05:38am]

» TA16-132A: Exploitation of SAP Business Applications
[11 May 2016 05:31am]

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

***
Computerworld Security

» You can now use an iPhone to log into a Windows 10 PC, Microsoft says
[30 Sep 2016 02:35pm]

» Android malware that can infiltrate corporate networks is spreading
[30 Sep 2016 01:50pm]

» By 2020, your Wi-Fi-connected car will pay for parking, gas
[30 Sep 2016 12:59pm]

» Firefox blocks websites with vulnerable encryption keys
[30 Sep 2016 11:06am]

» Ransomware spreads through weak remote desktop credentials
[30 Sep 2016 07:22am]

» IDG Contributor Network: The ultimate unanswerable question: Are we PCI-compliant?
[30 Sep 2016 05:27am]

» Sort of gives 'driving safely' a whole new meaning
[30 Sep 2016 04:00am]

» Bounty for iOS jailbreak exploit jumps to $1.5 million
[29 Sep 2016 06:51pm]

» Israeli startup says its new software would have prevented Tesla hack
[29 Sep 2016 12:52pm]

» Investigating Cybersecurity Incidents — a free course
[29 Sep 2016 12:43pm]

» 10 ways to secure a mobile workforce
[29 Sep 2016 06:56am]

» Why employees are still a security risk
[29 Sep 2016 06:00am]

» FBI reports more attempts to hack voter registration system
[29 Sep 2016 05:13am]

» Yahoo hackers weren't state-sponsored, a security firm says
[29 Sep 2016 04:30am]

» Cops run unauthorized searches on confidential databases for revenge, stalking
[28 Sep 2016 11:52am]

***
Microsoft Security Advisories

» 3174644 - Updated Support for Diffie-Hellman Key Exchange - Version: 1.0
[13 Sep 2016 11:00am]

» 3181759 - Vulnerabilities in ASP.NET Core View Components Could Allow Elevation of Privilege - Version: 1.0
[13 Sep 2016 11:00am]

» 3179528 - Update for Kernel Mode Blacklist - Version: 1.0
[09 Aug 2016 11:00am]

» 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0
[18 May 2016 11:00am]

» 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0
[10 May 2016 11:00am]

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 11:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 11:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 11:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 11:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 11:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 11:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 11:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 11:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 11:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 11:00am]

***
WIRED

» How to Steal an AI
[30 Sep 2016 09:06am]

» Turns Out Consumers Stay Loyal to Companies After Hacks
[30 Sep 2016 05:00am]

» Emergency Alert Texts Are Getting a Much Needed Upgrade
[29 Sep 2016 04:37pm]

» A Top-Shelf iPhone Hack Now Goes for $1.5 Million
[29 Sep 2016 04:00pm]

» Time to Kill Security Questions—or Answer Them With Lies
[28 Sep 2016 05:00am]

» Tesla Responds to Chinese Hack With a Major Security Upgrade
[27 Sep 2016 05:00am]

» Security News This Week: Hackers Take Control of a Moving Tesla’s Brakes
[24 Sep 2016 05:00am]

» Our Favorite Hacker Moments From Mr. Robot Season 2
[22 Sep 2016 12:18pm]

» Hack Brief: Yahoo Breach Hits Half a Billion Users
[22 Sep 2016 10:15am]

» Officials Are Scrambling to Protect the Election From Hackers
[21 Sep 2016 05:00am]

***
Network World Security

» We don't need more InfoSec analysts: We need analysts to train AI infrastructures to detect attacks
[30 Sep 2016 02:34pm]

» By 2020, your Wi-Fi-connected car will pay for parking, gas
[30 Sep 2016 01:57pm]

» Android malware that can infiltrate corporate networks is spreading
[30 Sep 2016 01:10pm]

» Splunk intent on extending cybersecurity leadership
[30 Sep 2016 11:16am]

» Open source routers deliver low cost, flexibility
[12 Sep 2016 04:00am]

» Review: 5 open source alternatives for routers/firewalls
[12 Sep 2016 04:00am]

» Review: SentinelOne blocks and dissects threats
[31 Aug 2016 05:40am]

» Review: Top tools for preventing data leaks
[29 Aug 2016 04:00am]

» Top tools for preventing data leaks
[29 Aug 2016 04:00am]

» Review: Promisec goes the extra step to secure PCs
[13 Jul 2016 06:21am]

» 4 tools for managing firewall rules
[07 Jul 2016 11:03am]

» 10 advanced endpoint protection tools
[05 Jul 2016 04:00am]

» How to buy endpoint security products
[05 Jul 2016 04:00am]

» Android malware that can infiltrate corporate networks is spreading
[30 Sep 2016 01:10pm]

» Firefox blocks websites with vulnerable encryption keys
[30 Sep 2016 10:36am]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}