NIST SP 800-53 Rev 5 HIGH
NIST SP 800-53 Rev 5 HIGH baseline. Federal control set for systems at HIGH impact.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (20)
AC Access Control
| Code | Title |
|---|---|
| AC-1 | Policy and Procedures |
| AC-10 | Concurrent Session Control |
| AC-11 | Device Lock |
| AC-11(1) | Pattern-hiding Displays |
| AC-12 | Session Termination |
| AC-14 | Permitted Actions Without Identification or Authentication |
| AC-17 | Remote Access |
| AC-17(1) | Monitoring and Control |
| AC-17(2) | Protection of Confidentiality and Integrity Using Encryption |
| AC-17(3) | Managed Access Control Points |
| AC-17(4) | Privileged Commands and Access |
| AC-18 | Wireless Access |
| AC-18(1) | Authentication and Encryption |
| AC-18(3) | Disable Wireless Networking |
| AC-19 | Access Control for Mobile Devices |
| AC-19(5) | Full Device or Container-Based Encryption |
| AC-2 | Account Management |
| AC-2(1) | Automated System Account Management |
| AC-2(11) | Usage Conditions |
| AC-2(12) | Account Monitoring for Atypical Usage |
| AC-2(13) | Disable Accounts for High-Risk Individuals |
| AC-2(2) | Automated Temporary and Emergency Account Management |
| AC-2(3) | Disable Accounts |
| AC-2(4) | Automated Audit Actions |
| AC-2(5) | Inactivity Logout |
| AC-20 | Use of External Systems |
| AC-20(1) | Limits on Authorized Use |
| AC-20(2) | Portable Storage Devices Restricted Use |
| AC-21 | Information Sharing |
| AC-22 | Publicly Accessible Content |
| AC-3 | Access Enforcement |
| AC-4 | Information Flow Enforcement |
| AC-4(4) | Flow Control of Encrypted Information |
| AC-5 | Separation of Duties |
| AC-6 | Least Privilege |
| AC-6(1) | Authorize Access to Security Functions |
| AC-6(10) | Prohibit Non-Privileged Users from Executing Privileged Functions |
| AC-6(2) | Non-Privileged Access for Nonsecurity Functions |
| AC-6(3) | Network Access to Privileged Commands |
| AC-6(5) | Privileged Accounts |
| AC-6(7) | Review of User Privileges |
| AC-6(9) | Log Use of Privileged Functions |
| AC-7 | Unsuccessful Logon Attempts |
| AC-8 | System Use Notification |
AT Awareness and Training
| Code | Title |
|---|---|
| AT-1 | Policy and Procedures |
| AT-2 | Literacy Training and Awareness |
| AT-2(2) | Insider Threat |
| AT-2(3) | Social Engineering and Mining |
| AT-3 | Role-Based Training |
| AT-4 | Training Records |
AU Audit and Accountability
| Code | Title |
|---|---|
| AU-1 | Policy and Procedures |
| AU-10 | Non-Repudiation |
| AU-11 | Audit Record Retention |
| AU-12 | Audit Record Generation |
| AU-12(1) | System-wide and Time-correlated Audit Trail |
| AU-12(3) | Changes by Authorized Individuals |
| AU-2 | Event Logging |
| AU-3 | Content of Audit Records |
| AU-3(1) | Additional Audit Information |
| AU-4 | Audit Log Storage Capacity |
| AU-5 | Response to Audit Logging Process Failures |
| AU-5(1) | Storage Capacity Warning |
| AU-5(2) | Real-Time Alerts |
| AU-6 | Audit Record Review, Analysis, and Reporting |
| AU-6(1) | Automated Process Integration |
| AU-6(3) | Correlate Audit Record Repositories |
| AU-6(5) | Integrated Analysis of Audit Records |
| AU-6(6) | Correlation with Physical Monitoring |
| AU-7 | Audit Record Reduction and Report Generation |
| AU-7(1) | Automatic Processing |
| AU-8 | Time Stamps |
| AU-9 | Protection of Audit Information |
| AU-9(2) | Store on Separate Physical Systems or Components |
| AU-9(3) | Cryptographic Protection |
| AU-9(4) | Access by Subset of Privileged Users |
CA Assessment Authorization Monitoring
| Code | Title |
|---|---|
| CA-1 | Policy and Procedures |
| CA-2 | Control Assessments |
| CA-2(1) | Independent Assessors |
| CA-3 | Information Exchange |
| CA-5 | Plan of Action and Milestones |
| CA-6 | Authorization |
| CA-7 | Continuous Monitoring |
| CA-7(1) | Independent Assessment |
| CA-7(4) | Risk Monitoring |
| CA-8 | Penetration Testing |
| CA-9 | Internal System Connections |
CM Configuration Management
| Code | Title |
|---|---|
| CM-1 | Policy and Procedures |
| CM-10 | Software Usage Restrictions |
| CM-11 | User-Installed Software |
| CM-12 | Information Location |
| CM-12(1) | Automated Tools to Support Information Location |
| CM-2 | Baseline Configuration |
| CM-2(2) | Automation Support for Accuracy and Currency |
| CM-2(3) | Retention of Previous Configurations |
| CM-2(7) | Configure Systems and Components for High-Risk Areas |
| CM-3 | Configuration Change Control |
| CM-3(1) | Automated Documentation, Notification, and Prohibition |
| CM-3(2) | Testing, Validation, and Documentation of Changes |
| CM-3(4) | Security and Privacy Representatives |
| CM-3(6) | Cryptography Management |
| CM-4 | Impact Analyses |
| CM-4(2) | Verification of Controls |
| CM-5 | Access Restrictions for Change |
| CM-5(1) | Automated Access Enforcement and Audit Records |
| CM-6 | Configuration Settings |
| CM-7 | Least Functionality |
| CM-7(1) | Periodic Review |
| CM-7(2) | Prevent Program Execution |
| CM-7(5) | Authorized Software Allow-by-Exception |
| CM-8 | System Component Inventory |
| CM-8(1) | Updates During Installation and Removal |
| CM-8(3) | Automated Unauthorized Component Detection |
| CM-8(4) | Accountability Information |
| CM-9 | Configuration Management Plan |
CP Contingency Planning
| Code | Title |
|---|---|
| CP-1 | Policy and Procedures |
| CP-10 | System Recovery and Reconstitution |
| CP-10(2) | Transaction Recovery |
| CP-10(4) | Restore Within Time Period |
| CP-2 | Contingency Plan |
| CP-2(1) | Coordinate with Related Plans |
| CP-2(2) | Capacity Planning |
| CP-2(3) | Resume Mission and Business Functions |
| CP-2(5) | Continue Mission and Business Functions |
| CP-2(8) | Identify Critical Assets |
| CP-3 | Contingency Training |
| CP-3(1) | Simulated Events |
| CP-4 | Contingency Plan Testing |
| CP-4(1) | Coordinate with Related Plans |
| CP-4(2) | Alternate Processing Site |
| CP-6 | Alternate Storage Site |
| CP-6(1) | Separation from Primary Site |
| CP-6(2) | Recovery Time and Recovery Point Objectives |
| CP-6(3) | Accessibility |
| CP-7 | Alternate Processing Site |
| CP-7(1) | Separation from Primary Site |
| CP-7(2) | Accessibility |
| CP-7(3) | Priority of Service |
| CP-7(4) | Preparation for Use |
| CP-8 | Telecommunications Services |
| CP-8(1) | Priority of Service Provisions |
| CP-8(2) | Single Points of Failure |
| CP-8(3) | Separation of Primary and Alternate Providers |
| CP-8(4) | Provider Contingency Plan |
| CP-9 | System Backup |
| CP-9(1) | Testing for Reliability and Integrity |
| CP-9(2) | Test Restoration Using Sampling |
| CP-9(3) | Separate Storage for Critical Information |
| CP-9(5) | Transfer to Alternate Storage Site |
| CP-9(8) | Cryptographic Protection |
IA Identification Authentication
| Code | Title |
|---|---|
| IA-1 | Policy and Procedures |
| IA-10 | Adaptive Authentication |
| IA-11 | Re-Authentication |
| IA-12 | Identity Proofing |
| IA-2 | Identification and Authentication (Organizational Users) |
| IA-3 | Device Identification and Authentication |
| IA-4 | Identifier Management |
| IA-5 | Authenticator Management |
| IA-6 | Authentication Feedback |
| IA-7 | Cryptographic Module Authentication |
| IA-8 | Identification and Authentication (Non-Organizational Users) |
IR Incident Response
| Code | Title |
|---|---|
| IR-1 | Event Detection and Triage |
| IR-2 | Incident Response and Recovery |
| IR-3 | Continuity of Operations |
| IR-4 | Incident Handling |
| IR-5 | Incident Monitoring |
| IR-6 | Incident Reporting |
| IR-7 | Incident Response Assistance |
| IR-8 | Incident Response Plan |
MA Maintenance
| Code | Title |
|---|---|
| MA-1 | Policy and Procedures |
| MA-2 | Controlled Maintenance |
| MA-3 | Maintenance Tools |
| MA-4 | Nonlocal Maintenance |
| MA-5 | Maintenance Personnel |
| MA-6 | Timely Maintenance |
MP Media Protection
| Code | Title |
|---|---|
| MP-1 | Policy and Procedures |
| MP-2 | Media Access |
| MP-3 | Media Marking |
| MP-4 | Media Storage |
| MP-5 | Media Transport |
| MP-6 | Media Sanitization |
| MP-7 | Media Use |
PE Physical and Environmental
| Code | Title |
|---|---|
| PE-1 | Policy and Procedures |
| PE-10 | Emergency Shutoff |
| PE-11 | Emergency Power |
| PE-12 | Emergency Lighting |
| PE-13 | Fire Protection |
| PE-14 | Environmental Controls |
| PE-15 | Water Damage Protection |
| PE-16 | Delivery and Removal |
| PE-17 | Alternate Work Site |
| PE-18 | Location of System Components |
| PE-19 | Information Leakage |
| PE-2 | Physical Access Authorizations |
| PE-20 | Asset Monitoring and Tracking |
| PE-3 | Physical Access Control |
| PE-4 | Access Control for Transmission |
| PE-5 | Access Control for Output Devices |
| PE-6 | Monitoring Physical Access |
| PE-8 | Visitor Access Records |
| PE-9 | Power Equipment and Cabling |
PL Planning
| Code | Title |
|---|---|
| PL-1 | Policy and Procedures |
| PL-10 | Baseline Selection |
| PL-11 | Baseline Tailoring |
| PL-2 | System Security and Privacy Plans |
| PL-4 | Rules of Behavior |
| PL-8 | Security and Privacy Architectures |
PM Program Management
| Code | Title |
|---|---|
| PM-1 | Information Security Program Plan |
| PM-10 | Authorization Process |
| PM-11 | Mission and Business Process Definition |
| PM-12 | Insider Threat Program |
| PM-13 | Security and Privacy Workforce |
| PM-14 | Testing, Training, and Monitoring |
| PM-15 | Security and Privacy Groups and Associations |
| PM-16 | Threat Awareness Program |
| PM-17 | Protecting CUI on External Systems |
| PM-18 | Privacy Program Plan |
| PM-19 | Privacy Program Leadership Role |
| PM-2 | Information Security Program Leadership Role |
| PM-20 | Dissemination of Privacy Program Information |
| PM-21 | Accounting of Disclosures |
| PM-22 | Personally Identifiable Information Quality Management |
| PM-23 | Data Governance Body |
| PM-24 | Data Integrity Board |
| PM-25 | Minimization of PII Used in Testing, Training, and Research |
| PM-26 | Complaint Management |
| PM-27 | Privacy Reporting |
| PM-28 | Risk Framing |
| PM-29 | Risk Management Program Leadership Roles |
| PM-3 | Information Security and Privacy Resources |
| PM-30 | Supply Chain Risk Management Strategy |
| PM-31 | Continuous Monitoring Strategy |
| PM-32 | Purposing |
| PM-4 | Plan of Action and Milestones Process |
| PM-5 | System Inventory |
| PM-6 | Measures of Performance |
| PM-7 | Enterprise Architecture |
| PM-8 | Critical Infrastructure Plan |
| PM-9 | Risk Management Strategy |
PS Personnel Security
| Code | Title |
|---|---|
| PS-1 | Policy and Procedures |
| PS-2 | Position Risk Designation |
| PS-3 | Personnel Screening |
| PS-4 | Personnel Termination |
| PS-5 | Personnel Transfer |
| PS-6 | Access Agreements |
| PS-7 | External Personnel Security |
| PS-8 | Personnel Sanctions |
| PS-9 | Position Descriptions |
PT PII Processing Transparency
| Code | Title |
|---|---|
| PT-1 | Policy and Procedures |
| PT-2 | Authority to Process PII |
| PT-3 | PII Processing Purposes |
| PT-4 | Consent |
| PT-5 | Privacy Notice |
| PT-6 | System of Records Notice |
| PT-7 | Specific Categories of PII |
| PT-8 | Computer Matching Requirements |
RA Risk Assessment
| Code | Title |
|---|---|
| RA-1 | Policy and Procedures |
| RA-2 | Security Categorization |
| RA-3 | Risk Assessment |
| RA-5 | Vulnerability Monitoring and Scanning |
| RA-7 | Identifies and Analyzes Risk |
| RA-9 | Identifies and Analyzes Significant Change |
SA System Services Acquisition
| Code | Title |
|---|---|
| SA-1 | Logging and Monitoring |
| SA-10 | Developer Configuration Management |
| SA-11 | Developer Testing and Evaluation |
| SA-15 | Development Process, Standards, and Tools |
| SA-16 | Developer-Provided Training |
| SA-17 | Developer Security and Privacy Architecture and Design |
| SA-2 | Common Operating Picture |
| SA-22 | Unsupported System Components |
| SA-3 | System Development Life Cycle |
| SA-4 | Acquisition Process |
| SA-5 | System Documentation |
| SA-8 | Security and Privacy Engineering Principles |
| SA-9 | External System Services |
SC System Communications Protection
| Code | Title |
|---|---|
| SC-1 | Policy and Procedures |
| SC-10 | Network Disconnect |
| SC-12 | Cryptographic Key Establishment and Management |
| SC-13 | Cryptographic Protection |
| SC-15 | Collaborative Computing Devices and Applications |
| SC-17 | Public Key Infrastructure Certificates |
| SC-18 | Mobile Code |
| SC-2 | Separation of System and User Functionality |
| SC-20 | Secure Name/Address Resolution Service (Authoritative) |
| SC-21 | Secure Name/Address Resolution Service (Recursive or Caching Resolver) |
| SC-22 | Architecture and Provisioning for Name/Address Resolution Service |
| SC-23 | Session Authenticity |
| SC-24 | Fail in Known State |
| SC-28 | Protection of Information at Rest |
| SC-3 | Security Function Isolation |
| SC-39 | Process Isolation |
| SC-4 | Information in Shared System Resources |
| SC-5 | Denial-of-Service Protection |
| SC-7 | Boundary Protection |
| SC-8 | Transmission Confidentiality and Integrity |
SI System Information Integrity
| Code | Title |
|---|---|
| SI-1 | Policy and Procedures |
| SI-10 | Information Input Validation |
| SI-11 | Error Handling |
| SI-12 | Information Management and Retention |
| SI-14 | Non-persistence |
| SI-16 | Memory Protection |
| SI-2 | Flaw Remediation |
| SI-3 | Malicious Code Protection |
| SI-4 | System Monitoring |
| SI-5 | Security Alerts, Advisories, and Directives |
| SI-6 | Security and Privacy Function Verification |
| SI-7 | Software, Firmware, and Information Integrity |
| SI-8 | Spam Protection |
SR Supply Chain Risk Management
| Code | Title |
|---|---|
| SR-1 | Policy and Procedures (SR-1) |
| SR-10 | Inspection of Systems or Components (SR-10) |
| SR-11 | Component Authenticity (SR-11) |
| SR-12 | Component Disposal (SR-12) |
| SR-2 | Supply Chain Risk Management Plan (SR-2) |
| SR-3 | Supply Chain Controls and Processes (SR-3) |
| SR-5 | Acquisition Strategies, Tools, and Methods (SR-5) |
| SR-6 | Supplier Assessments and Reviews (SR-6) |
| SR-8 | Notification Agreements (SR-8) |
| SR-9 | Tamper Resistance and Detection (SR-9) |
Your Compliance Coverage
If you comply with NIST SP 800-53 Rev 5 HIGH, you already cover:
Australia eSafety Commissioner — Online Safety Expectations for Industry
2%
7 controls mapped
Compare →GLI-33 — Gaming Laboratories International Event Wagering Systems
2%
7 controls mapped
Compare →Singapore Government Instruction Manual on ICT&SS Management (IM8)
2%
6 controls mapped
Compare →+ 615 more: ASEAN Data Management Framework (2%), NIST SP 800-190 (2%)
See all 618 mapped frameworks ↓Maps to 618 other frameworks
Frequently Asked Questions
What is NIST SP 800-53 Rev 5 HIGH?
NIST SP 800-53 Rev 5 HIGH is a compliance framework from United States with 20 domains and 317 controls. NIST SP 800-53 Rev 5 HIGH baseline. Federal control set for systems at HIGH impact. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does NIST SP 800-53 Rev 5 HIGH have?
NIST SP 800-53 Rev 5 HIGH has 317 controls organised across 20 domains. The largest domains are AC Access Control (44 controls), CP Contingency Planning (35 controls), PM Program Management (32 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does NIST SP 800-53 Rev 5 HIGH map to?
NIST SP 800-53 Rev 5 HIGH maps to 618 other compliance frameworks. The top mapping partners are Australia eSafety Commissioner — Online Safety Expectations for Industry (2% coverage), GLI-33 — Gaming Laboratories International Event Wagering Systems (2% coverage), Singapore Government Instruction Manual on ICT&SS Management (IM8) (2% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with NIST SP 800-53 Rev 5 HIGH compliance?
Start your NIST SP 800-53 Rev 5 HIGH compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about NIST SP 800-53 Rev 5 HIGH requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 317 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 769 frameworks.
Get Started Free →Free forever — no credit card required