NIST SP 800-53 Rev 5 MODERATE
NIST SP 800-53 Rev 5 MODERATE baseline. Federal control set for systems at MODERATE impact.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (20)
AC Access Control
| Code | Title |
|---|---|
| AC-1 | Policy and Procedures |
| AC-11 | Device Lock |
| AC-11(1) | Pattern-hiding Displays |
| AC-12 | Session Termination |
| AC-14 | Permitted Actions Without Identification or Authentication |
| AC-17 | Remote Access |
| AC-17(1) | Monitoring and Control |
| AC-17(2) | Protection of Confidentiality and Integrity Using Encryption |
| AC-17(3) | Managed Access Control Points |
| AC-17(4) | Privileged Commands and Access |
| AC-18 | Wireless Access |
| AC-18(1) | Authentication and Encryption |
| AC-18(3) | Disable Wireless Networking |
| AC-19 | Access Control for Mobile Devices |
| AC-19(5) | Full Device or Container-Based Encryption |
| AC-2 | Account Management |
| AC-2(1) | Automated System Account Management |
| AC-2(13) | Disable Accounts for High-Risk Individuals |
| AC-2(2) | Automated Temporary and Emergency Account Management |
| AC-2(3) | Disable Accounts |
| AC-2(4) | Automated Audit Actions |
| AC-2(5) | Inactivity Logout |
| AC-20 | Use of External Systems |
| AC-20(1) | Limits on Authorized Use |
| AC-20(2) | Portable Storage Devices Restricted Use |
| AC-21 | Information Sharing |
| AC-22 | Publicly Accessible Content |
| AC-3 | Access Enforcement |
| AC-4 | Information Flow Enforcement |
| AC-5 | Separation of Duties |
| AC-6 | Least Privilege |
| AC-6(1) | Authorize Access to Security Functions |
| AC-6(10) | Prohibit Non-Privileged Users from Executing Privileged Functions |
| AC-6(2) | Non-Privileged Access for Nonsecurity Functions |
| AC-6(5) | Privileged Accounts |
| AC-6(7) | Review of User Privileges |
| AC-6(9) | Log Use of Privileged Functions |
| AC-7 | Unsuccessful Logon Attempts |
| AC-8 | System Use Notification |
AT Awareness and Training
| Code | Title |
|---|---|
| AT-1 | Policy and Procedures |
| AT-2 | Literacy Training and Awareness |
| AT-2(2) | Insider Threat |
| AT-2(3) | Social Engineering and Mining |
| AT-3 | Role-Based Training |
| AT-4 | Training Records |
AU Audit and Accountability
| Code | Title |
|---|---|
| AU-1 | Policy and Procedures |
| AU-11 | Audit Record Retention |
| AU-12 | Audit Record Generation |
| AU-2 | Event Logging |
| AU-3 | Content of Audit Records |
| AU-3(1) | Additional Audit Information |
| AU-4 | Audit Log Storage Capacity |
| AU-5 | Response to Audit Logging Process Failures |
| AU-6 | Audit Record Review, Analysis, and Reporting |
| AU-6(1) | Automated Process Integration |
| AU-6(3) | Correlate Audit Record Repositories |
| AU-7 | Audit Record Reduction and Report Generation |
| AU-7(1) | Automatic Processing |
| AU-8 | Time Stamps |
| AU-9 | Protection of Audit Information |
| AU-9(4) | Access by Subset of Privileged Users |
CA Assessment, Authorization, and Monitoring
| Code | Title |
|---|---|
| CA-1 | Policy and Procedures |
| CA-2 | Control Assessments |
| CA-2(1) | Independent Assessors |
| CA-3 | Information Exchange |
| CA-5 | Plan of Action and Milestones |
| CA-6 | Authorization |
| CA-7 | Continuous Monitoring |
| CA-7(1) | Independent Assessment |
| CA-7(4) | Risk Monitoring |
| CA-9 | Internal System Connections |
CM Configuration Management
| Code | Title |
|---|---|
| CM-1 | Policy and Procedures |
| CM-10 | Software Usage Restrictions |
| CM-11 | User-Installed Software |
| CM-12 | Information Location |
| CM-12(1) | Automated Tools to Support Information Location |
| CM-2 | Baseline Configuration |
| CM-2(2) | Automation Support for Accuracy and Currency |
| CM-2(3) | Retention of Previous Configurations |
| CM-2(7) | Configure Systems and Components for High-Risk Areas |
| CM-3 | Configuration Change Control |
| CM-3(2) | Testing, Validation, and Documentation of Changes |
| CM-3(4) | Security and Privacy Representatives |
| CM-4 | Impact Analyses |
| CM-4(2) | Verification of Controls |
| CM-5 | Access Restrictions for Change |
| CM-6 | Configuration Settings |
| CM-7 | Least Functionality |
| CM-7(1) | Periodic Review |
| CM-7(2) | Prevent Program Execution |
| CM-7(5) | Authorized Software Allow-by-Exception |
| CM-8 | System Component Inventory |
| CM-8(1) | Updates During Installation and Removal |
| CM-8(3) | Automated Unauthorized Component Detection |
| CM-9 | Configuration Management Plan |
CP Contingency Planning
| Code | Title |
|---|---|
| CP-1 | Policy and Procedures |
| CP-10 | System Recovery and Reconstitution |
| CP-10(2) | Transaction Recovery |
| CP-2 | Contingency Plan |
| CP-2(1) | Coordinate with Related Plans |
| CP-2(3) | Resume Mission and Business Functions |
| CP-2(8) | Identify Critical Assets |
| CP-3 | Contingency Training |
| CP-4 | Contingency Plan Testing |
| CP-4(1) | Coordinate with Related Plans |
| CP-6 | Alternate Storage Site |
| CP-6(1) | Separation from Primary Site |
| CP-6(3) | Accessibility |
| CP-7 | Alternate Processing Site |
| CP-7(1) | Separation from Primary Site |
| CP-7(2) | Accessibility |
| CP-7(3) | Priority of Service |
| CP-8 | Telecommunications Services |
| CP-8(1) | Priority of Service Provisions |
| CP-8(2) | Single Points of Failure |
| CP-9 | System Backup |
| CP-9(1) | Testing for Reliability and Integrity |
| CP-9(8) | Cryptographic Protection |
IA Identification and Authentication
| Code | Title |
|---|---|
| IA-1 | Policy and Procedures |
| IA-11 | Re-Authentication |
| IA-12 | Identity Proofing |
| IA-2 | Identification and Authentication (Organizational Users) |
| IA-3 | Device Identification and Authentication |
| IA-4 | Identifier Management |
| IA-5 | Authenticator Management |
| IA-6 | Authentication Feedback |
| IA-7 | Cryptographic Module Authentication |
| IA-8 | Identification and Authentication (Non-Organizational Users) |
IR Incident Response
| Code | Title |
|---|---|
| IR-1 | Event Detection and Triage |
| IR-2 | Incident Response and Recovery |
| IR-3 | Continuity of Operations |
| IR-4 | Incident Handling |
| IR-5 | Incident Monitoring |
| IR-6 | Incident Reporting |
| IR-7 | Incident Response Assistance |
| IR-8 | Incident Response Plan |
MA Maintenance
| Code | Title |
|---|---|
| MA-1 | Policy and Procedures |
| MA-2 | Controlled Maintenance |
| MA-3 | Maintenance Tools |
| MA-4 | Nonlocal Maintenance |
| MA-5 | Maintenance Personnel |
| MA-6 | Timely Maintenance |
MP Media Protection
| Code | Title |
|---|---|
| MP-1 | Policy and Procedures |
| MP-2 | Media Access |
| MP-3 | Media Marking |
| MP-4 | Media Storage |
| MP-5 | Media Transport |
| MP-6 | Media Sanitization |
| MP-7 | Media Use |
PE Physical and Environmental Protection
| Code | Title |
|---|---|
| PE-1 | Policy and Procedures |
| PE-10 | Emergency Shutoff |
| PE-11 | Emergency Power |
| PE-12 | Emergency Lighting |
| PE-13 | Fire Protection |
| PE-14 | Environmental Controls |
| PE-15 | Water Damage Protection |
| PE-16 | Delivery and Removal |
| PE-17 | Alternate Work Site |
| PE-2 | Physical Access Authorizations |
| PE-3 | Physical Access Control |
| PE-4 | Access Control for Transmission |
| PE-5 | Access Control for Output Devices |
| PE-6 | Monitoring Physical Access |
| PE-8 | Visitor Access Records |
| PE-9 | Power Equipment and Cabling |
PL Planning
| Code | Title |
|---|---|
| PL-1 | Policy and Procedures |
| PL-10 | Baseline Selection |
| PL-11 | Baseline Tailoring |
| PL-2 | System Security and Privacy Plans |
| PL-4 | Rules of Behavior |
| PL-8 | Security and Privacy Architectures |
PM Program Management
| Code | Title |
|---|---|
| PM-1 | Information Security Program Plan |
| PM-10 | Authorization Process |
| PM-11 | Mission and Business Process Definition |
| PM-12 | Insider Threat Program |
| PM-13 | Security and Privacy Workforce |
| PM-14 | Testing, Training, and Monitoring |
| PM-15 | Security and Privacy Groups and Associations |
| PM-16 | Threat Awareness Program |
| PM-17 | Protecting CUI on External Systems |
| PM-18 | Privacy Program Plan |
| PM-19 | Privacy Program Leadership Role |
| PM-2 | Information Security Program Leadership Role |
| PM-20 | Dissemination of Privacy Program Information |
| PM-21 | Accounting of Disclosures |
| PM-22 | Personally Identifiable Information Quality Management |
| PM-23 | Data Governance Body |
| PM-24 | Data Integrity Board |
| PM-25 | Minimization of PII Used in Testing, Training, and Research |
| PM-26 | Complaint Management |
| PM-27 | Privacy Reporting |
| PM-28 | Risk Framing |
| PM-29 | Risk Management Program Leadership Roles |
| PM-3 | Information Security and Privacy Resources |
| PM-30 | Supply Chain Risk Management Strategy |
| PM-31 | Continuous Monitoring Strategy |
| PM-32 | Purposing |
| PM-4 | Plan of Action and Milestones Process |
| PM-5 | System Inventory |
| PM-6 | Measures of Performance |
| PM-7 | Enterprise Architecture |
| PM-8 | Critical Infrastructure Plan |
| PM-9 | Risk Management Strategy |
PS Personnel Security
| Code | Title |
|---|---|
| PS-1 | Policy and Procedures |
| PS-2 | Position Risk Designation |
| PS-3 | Personnel Screening |
| PS-4 | Personnel Termination |
| PS-5 | Personnel Transfer |
| PS-6 | Access Agreements |
| PS-7 | External Personnel Security |
| PS-8 | Personnel Sanctions |
| PS-9 | Position Descriptions |
PT PII Processing and Transparency
| Code | Title |
|---|---|
| PT-1 | Policy and Procedures |
| PT-2 | Authority to Process PII |
| PT-3 | PII Processing Purposes |
| PT-4 | Consent |
| PT-5 | Privacy Notice |
| PT-6 | System of Records Notice |
| PT-7 | Specific Categories of PII |
| PT-8 | Computer Matching Requirements |
RA Risk Assessment
| Code | Title |
|---|---|
| RA-1 | Policy and Procedures |
| RA-2 | Security Categorization |
| RA-3 | Risk Assessment |
| RA-5 | Vulnerability Monitoring and Scanning |
| RA-7 | Identifies and Analyzes Risk |
| RA-9 | Identifies and Analyzes Significant Change |
SA System and Services Acquisition
| Code | Title |
|---|---|
| SA-1 | Logging and Monitoring |
| SA-10 | Developer Configuration Management |
| SA-11 | Developer Testing and Evaluation |
| SA-15 | Development Process, Standards, and Tools |
| SA-2 | Common Operating Picture |
| SA-22 | Unsupported System Components |
| SA-3 | System Development Life Cycle |
| SA-4 | Acquisition Process |
| SA-5 | System Documentation |
| SA-8 | Security and Privacy Engineering Principles |
| SA-9 | External System Services |
SC System and Communications Protection
| Code | Title |
|---|---|
| SC-1 | Policy and Procedures |
| SC-10 | Network Disconnect |
| SC-12 | Cryptographic Key Establishment and Management |
| SC-13 | Cryptographic Protection |
| SC-15 | Collaborative Computing Devices and Applications |
| SC-17 | Public Key Infrastructure Certificates |
| SC-18 | Mobile Code |
| SC-2 | Separation of System and User Functionality |
| SC-20 | Secure Name/Address Resolution Service (Authoritative) |
| SC-21 | Secure Name/Address Resolution Service (Recursive or Caching Resolver) |
| SC-22 | Architecture and Provisioning for Name/Address Resolution Service |
| SC-23 | Session Authenticity |
| SC-28 | Protection of Information at Rest |
| SC-39 | Process Isolation |
| SC-4 | Information in Shared System Resources |
| SC-5 | Denial-of-Service Protection |
| SC-7 | Boundary Protection |
| SC-8 | Transmission Confidentiality and Integrity |
SI System and Information Integrity
| Code | Title |
|---|---|
| SI-1 | Policy and Procedures |
| SI-10 | Information Input Validation |
| SI-11 | Error Handling |
| SI-12 | Information Management and Retention |
| SI-16 | Memory Protection |
| SI-2 | Flaw Remediation |
| SI-3 | Malicious Code Protection |
| SI-4 | System Monitoring |
| SI-5 | Security Alerts, Advisories, and Directives |
| SI-7 | Software, Firmware, and Information Integrity |
| SI-8 | Spam Protection |
SR Supply Chain Risk Management
| Code | Title |
|---|---|
| SR-1 | Policy and Procedures (SR-1) |
| SR-10 | Inspection of Systems or Components (SR-10) |
| SR-11 | Component Authenticity (SR-11) |
| SR-12 | Component Disposal (SR-12) |
| SR-2 | Supply Chain Risk Management Plan (SR-2) |
| SR-3 | Supply Chain Controls and Processes (SR-3) |
| SR-5 | Acquisition Strategies, Tools, and Methods (SR-5) |
| SR-6 | Supplier Assessments and Reviews (SR-6) |
| SR-8 | Notification Agreements (SR-8) |
Your Compliance Coverage
If you comply with NIST SP 800-53 Rev 5 MODERATE, you already cover:
Australia eSafety Commissioner — Online Safety Expectations for Industry
2%
6 controls mapped
Compare →GLI-33 — Gaming Laboratories International Event Wagering Systems
2%
6 controls mapped
Compare →Singapore Government Instruction Manual on ICT&SS Management (IM8)
2%
5 controls mapped
Compare →+ 615 more: ASEAN Data Management Framework (2%), NIST SP 800-190 (2%)
See all 618 mapped frameworks ↓Maps to 618 other frameworks
Frequently Asked Questions
What is NIST SP 800-53 Rev 5 MODERATE?
NIST SP 800-53 Rev 5 MODERATE is a compliance framework from United States with 20 domains and 275 controls. NIST SP 800-53 Rev 5 MODERATE baseline. Federal control set for systems at MODERATE impact. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does NIST SP 800-53 Rev 5 MODERATE have?
NIST SP 800-53 Rev 5 MODERATE has 275 controls organised across 20 domains. The largest domains are AC Access Control (39 controls), PM Program Management (32 controls), CM Configuration Management (24 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does NIST SP 800-53 Rev 5 MODERATE map to?
NIST SP 800-53 Rev 5 MODERATE maps to 618 other compliance frameworks. The top mapping partners are Australia eSafety Commissioner — Online Safety Expectations for Industry (2% coverage), GLI-33 — Gaming Laboratories International Event Wagering Systems (2% coverage), Singapore Government Instruction Manual on ICT&SS Management (IM8) (2% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with NIST SP 800-53 Rev 5 MODERATE compliance?
Start your NIST SP 800-53 Rev 5 MODERATE compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about NIST SP 800-53 Rev 5 MODERATE requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 275 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 769 frameworks.
Get Started Free →Free forever — no credit card required