| πΌ Access Control | 18 | 61 | 161 | | no data |
| γπΌ AC-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ AC-2 Account Management (L)(M)(H) | 10 | 8 | 38 | | no data |
| γγπΌ AC-2(1) Automated System Account Management (M)(H) | | | 18 | | no data |
| γγπΌ AC-2(2) Automated Temporary and Emergency Account Management (M)(H) | | | | | no data |
| γγπΌ AC-2(3) Disable Accounts (M)(H) | | | 4 | | no data |
| γγπΌ AC-2(4) Automated Audit Actions (M)(H) | | | 16 | | no data |
| γγπΌ AC-2(5) Inactivity Logout (M)(H) | | | | | no data |
| γγπΌ AC-2(7) Privileged User Accounts (M)(H) | | 6 | 7 | | no data |
| γγπΌ AC-2(9) Restrictions on Use of Shared and Group Accounts (M)(H) | | 2 | 2 | | no data |
| γγπΌ AC-2(11) Usage Conditions (H) | | | | | no data |
| γγπΌ AC-2(12) Account Monitoring for Atypical Usage (M)(H) | | 1 | 2 | | no data |
| γγπΌ AC-2(13) Disable Accounts for High-risk Individuals (M)(H) | | | | | no data |
| γπΌ AC-3 Access Enforcement (L)(M)(H) | | 37 | 68 | | no data |
| γπΌ AC-4 Information Flow Enforcement (M)(H) | 2 | 36 | 81 | | no data |
| γγπΌ AC-4(4) Flow Control of Encrypted Information (H) | | 25 | 26 | | no data |
| γγπΌ AC-4(21) Physical or Logical Separation of Information Flows (M)(H) | | 11 | 48 | | no data |
| γπΌ AC-5 Separation of Duties (M)(H) | | | 15 | | no data |
| γπΌ AC-6 Least Privilege (M)(H) | 8 | 11 | 57 | | no data |
| γγπΌ AC-6(1) Authorize Access to Security Functions (M)(H) | | 4 | 4 | | no data |
| γγπΌ AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H) | | 1 | 5 | | no data |
| γγπΌ AC-6(3) Network Access to Privileged Commands (H) | | 1 | 2 | | no data |
| γγπΌ AC-6(5) Privileged Accounts (M)(H) | | 3 | 5 | | no data |
| γγπΌ AC-6(7) Review of User Privileges (M)(H) | | 2 | 2 | | no data |
| γγπΌ AC-6(8) Privilege Levels for Code Execution (H) | | | | | no data |
| γγπΌ AC-6(9) Log Use of Privileged Functions (M)(H) | | 7 | 26 | | no data |
| γγπΌ AC-6(10) Prohibit Non-privileged Users from Executing Privileged Functions (M)(H) | | 1 | 4 | | no data |
| γπΌ AC-7 Unsuccessful Logon Attempts (L)(M)(H) | | 1 | 1 | | no data |
| γπΌ AC-8 System Use Notification (L)(M)(H) | | | | | no data |
| γπΌ AC-10 Concurrent Session Control (H) | | | | | no data |
| γπΌ AC-11 Device Lock (M)(H) | 1 | | | | no data |
| γγπΌ AC-11(1) Pattern-hiding Displays (M)(H) | | | | | no data |
| γπΌ AC-12 Session Termination (M)(H) | | | | | no data |
| γπΌ AC-14 Permitted Actions Without Identification or Authentication (L)(M)(H) | | | | | no data |
| γπΌ AC-17 Remote Access (L)(M)(H) | 4 | | 19 | | no data |
| γγπΌ AC-17(1) Monitoring and Control (M)(H) | | | 1 | | no data |
| γγπΌ AC-17(2) Protection of Confidentiality and Integrity Using Encryption (M)(H) | | | 17 | | no data |
| γγπΌ AC-17(3) Managed Access Control Points (M)(H) | | | | | no data |
| γγπΌ AC-17(4) Privileged Commands and Access (M)(H) | | | | | no data |
| γπΌ AC-18 Wireless Access (L)(M)(H) | 4 | | 5 | | no data |
| γγπΌ AC-18(1) Authentication and Encryption (M)(H) | | | | | no data |
| γγπΌ AC-18(3) Disable Wireless Networking (M)(H) | | | | | no data |
| γγπΌ AC-18(4) Restrict Configurations by Users (H) | | | | | no data |
| γγπΌ AC-18(5) Antennas and Transmission Power Levels (H) | | | | | no data |
| γπΌ AC-19 Access Control for Mobile Devices (L)(M)(H) | 1 | | | | no data |
| γγπΌ AC-19(5) Full Device or Container-based Encryption (M)(H) | | | | | no data |
| γπΌ AC-20 Use of External Systems (L)(M)(H) | 2 | | | | no data |
| γγπΌ AC-20(1) Limits on Authorized Use (M)(H) | | | | | no data |
| γγπΌ AC-20(2) Portable Storage Devices β Restricted Use (M)(H) | | | | | no data |
| γπΌ AC-21 Information Sharing (M)(H) | | | 8 | | no data |
| γπΌ AC-22 Publicly Accessible Content (L)(M)(H) | | | | | no data |
| πΌ Assessment, Authorization, and Monitoring | 8 | | 14 | | no data |
| γπΌ CA-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ CA-2 Control Assessments (L)(M)(H) | 3 | | | | no data |
| γγπΌ CA-2(1) Independent Assessors (L)(M)(H) | | | | | no data |
| γγπΌ CA-2(2) Specialized Assessments (H) | | | | | no data |
| γγπΌ CA-2(3) Leveraging Results from External Organizations (M)(H) | | | | | no data |
| γπΌ CA-3 Information Exchange (L)(M)(H) | 1 | | | | no data |
| γγπΌ CA-3(6) Transfer Authorizations (H) | | | | | no data |
| γπΌ CA-5 Plan of Action and Milestones (L)(M)(H) | | | | | no data |
| γπΌ CA-6 Authorization (L)(M)(H) | | | | | no data |
| γπΌ CA-7 Continuous Monitoring (L)(M)(H) | 2 | | 13 | | no data |
| γγπΌ CA-7(1) Independent Assessment (M)(H) | | | | | no data |
| γγπΌ CA-7(4) Risk Monitoring (L)(M)(H) | | | | | no data |
| γπΌ CA-8 Penetration Testing (L)(M)(H) | 2 | | | | no data |
| γγπΌ CA-8(1) Independent Penetration Testing Agent or Team (M)(H) | | | | | no data |
| γγπΌ CA-8(2) Red Team Exercises (M)(H) | | | | | no data |
| γπΌ CA-9 Internal System Connections (L)(M)(H) | | | 1 | | no data |
| πΌ Audit and Accountability | 12 | 21 | 75 | | no data |
| γπΌ AU-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ AU-2 Event Logging (L)(M)(H) | | | 17 | | no data |
| γπΌ AU-3 Content of Audit Records (L)(M)(H) | 1 | | 28 | | no data |
| γγπΌ AU-3(1) Additional Audit Information (M)(H) | | | 14 | | no data |
| γπΌ AU-4 Audit Log Storage Capacity (L)(M)(H) | | | | | no data |
| γπΌ AU-5 Response to Audit Logging Process Failures (L)(M)(H) | 2 | | | | no data |
| γγπΌ AU-5(1) Storage Capacity Warning (H) | | | | | no data |
| γγπΌ AU-5(2) Real-time Alerts (H) | | | | | no data |
| γπΌ AU-6 Audit Record Review, Analysis, and Reporting (L)(M)(H) | 6 | 20 | 32 | | no data |
| γγπΌ AU-6(1) Automated Process Integration (M)(H) | | | 3 | | no data |
| γγπΌ AU-6(3) Correlate Audit Record Repositories (M)(H) | | | 8 | | no data |
| γγπΌ AU-6(4) Central Review and Analysis (H) | | | 8 | | no data |
| γγπΌ AU-6(5) Integrated Analysis of Audit Records (H) | | | 2 | | no data |
| γγπΌ AU-6(6) Correlation with Physical Monitoring (H) | | | | | no data |
| γγπΌ AU-6(7) Permitted Actions (H) | | | | | no data |
| γπΌ AU-7 Audit Record Reduction and Report Generation (M)(H) | 1 | | 18 | | no data |
| γγπΌ AU-7(1) Automatic Processing (M)(H) | | | 1 | | no data |
| γπΌ AU-8 Time Stamps (L)(M)(H) | | | | | no data |
| γπΌ AU-9 Protection of Audit Information (L)(M)(H) | 3 | 8 | 11 | | no data |
| γγπΌ AU-9(2) Store on Separate Physical Systems or Components (H) | | | 1 | | no data |
| γγπΌ AU-9(3) Cryptographic Protection (H) | | | | | no data |
| γγπΌ AU-9(4) Access by Subset of Privileged Users (M)(H) | | | | | no data |
| γπΌ AU-10 Non-repudiation (H) | | | 7 | | no data |
| γπΌ AU-11 Audit Record Retention (L)(M)(H) | | 16 | 18 | | no data |
| γπΌ AU-12 Audit Record Generation (L)(M)(H) | 2 | | 65 | | no data |
| γγπΌ AU-12(1) System-wide and Time-correlated Audit Trail (H) | | | | | no data |
| γγπΌ AU-12(3) Changes by Authorized Individuals (H) | | | | | no data |
| πΌ Awareness and Training | 4 | | | | no data |
| γπΌ AT-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ AT-2 Literacy Training and Awareness (L)(M)(H) | 2 | | | | no data |
| γγπΌ AT-2(2) Insider Threat (L)(M)(H) | | | | | no data |
| γγπΌ AT-2(3) Social Engineering and Mining (M)(H) | | | | | no data |
| γπΌ AT-3 Role-based Training (L)(M)(H) | | | | | no data |
| γπΌ AT-4 Training Records (L)(M)(H) | | | | | no data |
| πΌ Configuration Management | 13 | 29 | 84 | | no data |
| γπΌ CM-1 Policy and Procedures (L)(M)(H) | | | 3 | | no data |
| γπΌ CM-2 Baseline Configuration (L)(M)(H) | 3 | 1 | 30 | | no data |
| γγπΌ CM-2(2) Automation Support for Accuracy and Currency (M)(H) | | | 16 | | no data |
| γγπΌ CM-2(3) Retention of Previous Configurations (M)(H) | | 1 | 1 | | no data |
| γγπΌ CM-2(7) Configure Systems and Components for High-risk Areas (M)(H) | | | | | no data |
| γπΌ CM-3 Configuration Change Control (M)(H) | 4 | | 25 | | no data |
| γγπΌ CM-3(1) Automated Documentation, Notification, and Prohibition of Changes (H) | | | | | no data |
| γγπΌ CM-3(2) Testing, Validation, and Documentation of Changes (M)(H) | | | | | no data |
| γγπΌ CM-3(4) Security and Privacy Representatives (M)(H) | | | | | no data |
| γγπΌ CM-3(6) Cryptography Management (H) | | | 6 | | no data |
| γπΌ CM-4 Impact Analyses (L)(M)(H) | 2 | | | | no data |
| γγπΌ CM-4(1) Separate Test Environments (H) | | | | | no data |
| γγπΌ CM-4(2) Verification of Controls (M)(H) | | | | | no data |
| γπΌ CM-5 Access Restrictions for Change (L)(M)(H) | 2 | 14 | 16 | | no data |
| γγπΌ CM-5(1) Automated Access Enforcement and Audit Records (M)(H) | | 7 | 8 | | no data |
| γγπΌ CM-5(5) Privilege Limitation for Production and Operation (M)(H) | | 1 | 1 | | no data |
| γπΌ CM-6 Configuration Settings (L)(M)(H) | 2 | | 12 | | no data |
| γγπΌ CM-6(1) Automated Management, Application, and Verification (M)(H) | | | 1 | | no data |
| γγπΌ CM-6(2) Respond to Unauthorized Changes (H) | | | | | no data |
| γπΌ CM-7 Least Functionality (L)(M)(H) | 3 | 18 | 33 | | no data |
| γγπΌ CM-7(1) Periodic Review (M)(H) | | 12 | 12 | | no data |
| γγπΌ CM-7(2) Prevent Program Execution (M)(H) | | | | | no data |
| γγπΌ CM-7(5) Authorized Software β Allow-by-exception (M)(H) | | | | | no data |
| γπΌ CM-8 System Component Inventory (L)(M)(H) | 4 | | 5 | | no data |
| γγπΌ CM-8(1) Updates During Installation and Removal (M)(H) | | | 2 | | no data |
| γγπΌ CM-8(2) Automated Maintenance (H) | | | 1 | | no data |
| γγπΌ CM-8(3) Automated Unauthorized Component Detection (M)(H) | | | 1 | | no data |
| γγπΌ CM-8(4) Accountability Information (H) | | | | | no data |
| γπΌ CM-9 Configuration Management Plan (M)(H) | | | 8 | | no data |
| γπΌ CM-10 Software Usage Restrictions (L)(M)(H) | | | | | no data |
| γπΌ CM-11 User-installed Software (L)(M)(H) | | 4 | 4 | | no data |
| γπΌ CM-12 Information Location (M)(H) | 1 | | | | no data |
| γγπΌ CM-12(1) Automated Tools to Support Information Location (M)(H) | | | | | no data |
| γπΌ CM-14 Signed Components (H) | | | | | no data |
| πΌ Contingency Planning | 9 | 4 | 18 | | no data |
| γπΌ CP-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ CP-2 Contingency Plan (L)(M)(H) | 5 | | 3 | | no data |
| γγπΌ CP-2(1) Coordinate with Related Plans (M)(H) | | | | | no data |
| γγπΌ CP-2(2) Capacity Planning (H) | | | 3 | | no data |
| γγπΌ CP-2(3) Resume Mission and Business Functions (M)(H) | | | | | no data |
| γγπΌ CP-2(5) Continue Mission and Business Functions (H) | | | | | no data |
| γγπΌ CP-2(8) Identify Critical Assets (M)(H) | | | | | no data |
| γπΌ CP-3 Contingency Training (L)(M)(H) | 1 | | | | no data |
| γγπΌ CP-3(1) Simulated Events (H) | | | | | no data |
| γπΌ CP-4 Contingency Plan Testing (L)(M)(H) | 2 | | | | no data |
| γγπΌ CP-4(1) Coordinate with Related Plans (M)(H) | | | | | no data |
| γγπΌ CP-4(2) Alternate Processing Site (H) | | | | | no data |
| γπΌ CP-6 Alternate Storage Site (M)(H) | 3 | | 12 | | no data |
| γγπΌ CP-6(1) Separation from Primary Site (M)(H) | | | 3 | | no data |
| γγπΌ CP-6(2) Recovery Time and Recovery Point Objectives (H) | | | 12 | | no data |
| γγπΌ CP-6(3) Accessibility (M)(H) | | | | | no data |
| γπΌ CP-7 Alternate Processing Site (M)(H) | 4 | | | | no data |
| γγπΌ CP-7(1) Separation from Primary Site (M)(H) | | | | | no data |
| γγπΌ CP-7(2) Accessibility (M)(H) | | | | | no data |
| γγπΌ CP-7(3) Priority of Service (M)(H) | | | | | no data |
| γγπΌ CP-7(4) Preparation for Use (H) | | | | | no data |
| γπΌ CP-8 Telecommunications Services (M)(H) | 4 | | | | no data |
| γγπΌ CP-8(1) Priority of Service Provisions (M)(H) | | | | | no data |
| γγπΌ CP-8(2) Single Points of Failure (M)(H) | | | | | no data |
| γγπΌ CP-8(3) Separation of Primary and Alternate Providers (H) | | | | | no data |
| γγπΌ CP-8(4) Provider Contingency Plan (H) | | | | | no data |
| γπΌ CP-9 System Backup (L)(M)(H) | 5 | 4 | 10 | | no data |
| γγπΌ CP-9(1) Testing for Reliability and Integrity (M)(H) | | | | | no data |
| γγπΌ CP-9(2) Test Restoration Using Sampling (H) | | | | | no data |
| γγπΌ CP-9(3) Separate Storage for Critical Information (H) | | | | | no data |
| γγπΌ CP-9(5) Transfer to Alternate Storage Site (H) | | | | | no data |
| γγπΌ CP-9(8) Cryptographic Protection (M)(H) | | | 1 | | no data |
| γπΌ CP-10 System Recovery and Reconstitution (L)(M)(H) | 2 | | 12 | | no data |
| γγπΌ CP-10(2) Transaction Recovery (M)(H) | | | | | no data |
| γγπΌ CP-10(4) Restore Within Time Period (H) | | | | | no data |
| πΌ Identification and Authentication | 10 | 15 | 36 | | no data |
| γπΌ IA-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ IA-2 Identification and Authentication (Organizational Users) (L)(M)(H) | 6 | 1 | 4 | | no data |
| γγπΌ IA-2(1) Multi-factor Authentication to Privileged Accounts (L)(M)(H) | | | 3 | | no data |
| γγπΌ IA-2(2) Multi-factor Authentication to Non-privileged Accounts (L)(M)(H) | | | 3 | | no data |
| γγπΌ IA-2(5) Individual Authentication with Group Authentication (M)(H) | | | | | no data |
| γγπΌ IA-2(6) Access to Accounts βseparate Device (M)(H) | | | 3 | | no data |
| γγπΌ IA-2(8) Access to Accounts β Replay Resistant (L)(M)(H) | | | 3 | | no data |
| γγπΌ IA-2(12) Acceptance of PIV Credentials (L)(M)(H) | | | | | no data |
| γπΌ IA-3 Device Identification and Authentication (M)(H) | | | | | no data |
| γπΌ IA-4 Identifier Management (L)(M)(H) | 1 | 1 | 1 | | no data |
| γγπΌ IA-4(4) Identify User Status (M)(H) | | | | | no data |
| γπΌ IA-5 Authenticator Management (L)(M)(H) | 6 | 14 | 32 | | no data |
| γγπΌ IA-5(1) Password-based Authentication (L)(M)(H) | | 1 | 8 | | no data |
| γγπΌ IA-5(2) Public Key-based Authentication (M)(H) | | 1 | 1 | | no data |
| γγπΌ IA-5(6) Protection of Authenticators (M)(H) | | | | | no data |
| γγπΌ IA-5(7) No Embedded Unencrypted Static Authenticators (M)(H) | | | | | no data |
| γγπΌ IA-5(8) Multiple System Accounts (H) | | | | | no data |
| γγπΌ IA-5(13) Expiration of Cached Authenticators (H) | | 1 | 1 | | no data |
| γπΌ IA-6 Authentication Feedback (L)(M)(H) | | 1 | 1 | | no data |
| γπΌ IA-7 Cryptographic Module Authentication (L)(M)(H) | | | | | no data |
| γπΌ IA-8 Identification and Authentication (Non-organizational Users) (L)(M)(H) | 3 | | | | no data |
| γγπΌ IA-8(1) Acceptance of PIV Credentials from Other Agencies (L)(M)(H) | | | | | no data |
| γγπΌ IA-8(2) Acceptance of External Authenticators (L)(M)(H) | | | | | no data |
| γγπΌ IA-8(4) Use of Defined Profiles (L)(M)(H) | | | | | no data |
| γπΌ IA-11 Re-authentication (L)(M)(H) | | | | | no data |
| γπΌ IA-12 Identity Proofing (M)(H) | 4 | | | | no data |
| γγπΌ IA-12(2) Identity Evidence (M)(H) | | | | | no data |
| γγπΌ IA-12(3) Identity Evidence Validation and Verification (M)(H) | | | | | no data |
| γγπΌ IA-12(4) In-person Validation and Verification (H) | | | | | no data |
| γγπΌ IA-12(5) Address Confirmation (M)(H) | | | | | no data |
| πΌ Incident Response | 9 | 10 | 14 | | no data |
| γπΌ IR-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ IR-2 Incident Response Training (L)(M)(H) | 2 | | | | no data |
| γγπΌ IR-2(1) Simulated Events (H) | | | | | no data |
| γγπΌ IR-2(2) Automated Training Environments (H) | | | | | no data |
| γπΌ IR-3 Incident Response Testing (M)(H) | 1 | | | | no data |
| γγπΌ IR-3(2) Coordination with Related Plans (M)(H) | | | | | no data |
| γπΌ IR-4 Incident Handling (L)(M)(H) | 5 | | 1 | | no data |
| γγπΌ IR-4(1) Automated Incident Handling Processes (M)(H) | | | 1 | | no data |
| γγπΌ IR-4(2) Dynamic Reconfiguration (H) | | | | | no data |
| γγπΌ IR-4(4) Information Correlation (H) | | | | | no data |
| γγπΌ IR-4(6) Insider Threats (H) | | | | | no data |
| γγπΌ IR-4(11) Integrated Incident Response Team (H) | | | | | no data |
| γπΌ IR-5 Incident Monitoring (L)(M)(H) | 1 | | | | no data |
| γγπΌ IR-5(1) Automated Tracking, Data Collection, and Analysis (H) | | | | | no data |
| γπΌ IR-6 Incident Reporting (L)(M)(H) | 2 | 10 | 13 | | no data |
| γγπΌ IR-6(1) Automated Reporting (M)(H) | | 8 | 10 | | no data |
| γγπΌ IR-6(3) Supply Chain Coordination (M)(H) | | 2 | 2 | | no data |
| γπΌ IR-7 Incident Response Assistance (L)(M)(H) | 1 | | | | no data |
| γγπΌ IR-7(1) Automation Support for Availability of Information and Support (M)(H) | | | | | no data |
| γπΌ IR-8 Incident Response Plan (L)(M)(H) | | | | | no data |
| γπΌ IR-9 Information Spillage Response (M)(H) | 3 | | | | no data |
| γγπΌ IR-9(2) Training (M)(H) | | | | | no data |
| γγπΌ IR-9(3) Post-spill Operations (M)(H) | | | | | no data |
| γγπΌ IR-9(4) Exposure to Unauthorized Personnel (M)(H) | | | | | no data |
| πΌ Maintenance | 6 | | 1 | | no data |
| γπΌ MA-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ MA-2 Controlled Maintenance (L)(M)(H) | 1 | | | | no data |
| γγπΌ MA-2(2) Automated Maintenance Activities (H) | | | | | no data |
| γπΌ MA-3 Maintenance Tools (M)(H) | 3 | | | | no data |
| γγπΌ MA-3(1) Inspect Tools (M)(H) | | | | | no data |
| γγπΌ MA-3(2) Inspect Media (M)(H) | | | | | no data |
| γγπΌ MA-3(3) Prevent Unauthorized Removal (M)(H) | | | | | no data |
| γπΌ MA-4 Nonlocal Maintenance (L)(M)(H) | 1 | | 1 | | no data |
| γγπΌ MA-4(3) Comparable Security and Sanitization (H) | | | | | no data |
| γπΌ MA-5 Maintenance Personnel (L)(M)(H) | 1 | | | | no data |
| γγπΌ MA-5(1) Individuals Without Appropriate Access (M)(H) | | | | | no data |
| γπΌ MA-6 Timely Maintenance (M)(H) | | | | | no data |
| πΌ Media Protection | 7 | | 13 | | no data |
| γπΌ MP-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ MP-2 Media Access (L)(M)(H) | | | 13 | | no data |
| γπΌ MP-3 Media Marking (M)(H) | | | | | no data |
| γπΌ MP-4 Media Storage (M)(H) | | | | | no data |
| γπΌ MP-5 Media Transport (M)(H) | | | | | no data |
| γπΌ MP-6 Media Sanitization (L)(M)(H) | 3 | | | | no data |
| γγπΌ MP-6(1) Review, Approve, Track, Document, and Verify (H) | | | | | no data |
| γγπΌ MP-6(2) Equipment Testing (H) | | | | | no data |
| γγπΌ MP-6(3) Nondestructive Techniques (H) | | | | | no data |
| γπΌ MP-7 Media Use (L)(M)(H) | | | | | no data |
| πΌ Personnel Security | 9 | | | | no data |
| γπΌ PS-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ PS-2 Position Risk Designation (L)(M)(H) | | | | | no data |
| γπΌ PS-3 Personnel Screening (L)(M)(H) | 1 | | | | no data |
| γγπΌ PS-3(3) Information Requiring Special Protective Measures (M)(H) | | | | | no data |
| γπΌ PS-4 Personnel Termination (L)(M)(H) | 1 | | | | no data |
| γγπΌ PS-4(2) Automated Actions (H) | | | | | no data |
| γπΌ PS-5 Personnel Transfer (L)(M)(H) | | | | | no data |
| γπΌ PS-6 Access Agreements (L)(M)(H) | | | | | no data |
| γπΌ PS-7 External Personnel Security (L)(M)(H) | | | | | no data |
| γπΌ PS-8 Personnel Sanctions (L)(M)(H) | | | | | no data |
| γπΌ PS-9 Position Descriptions (L)(M)(H) | | | | | no data |
| πΌ Physical and Environmental Protection | 17 | | | | no data |
| γπΌ PE-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ PE-2 Physical Access Authorizations (L)(M)(H) | | | | | no data |
| γπΌ PE-3 Physical Access Control (L)(M)(H) | 1 | | | | no data |
| γγπΌ PE-3(1) System Access (H) | | | | | no data |
| γπΌ PE-4 Access Control for Transmission (M)(H) | | | | | no data |
| γπΌ PE-5 Access Control for Output Devices (M)(H) | | | | | no data |
| γπΌ PE-6 Monitoring Physical Access (L)(M)(H) | 2 | | | | no data |
| γγπΌ PE-6(1) Intrusion Alarms and Surveillance Equipment (M)(H) | | | | | no data |
| γγπΌ PE-6(4) Monitoring Physical Access to Systems (H) | | | | | no data |
| γπΌ PE-8 Visitor Access Records (L)(M)(H) | 1 | | | | no data |
| γγπΌ PE-8(1) Automated Records Maintenance and Review (H) | | | | | no data |
| γπΌ PE-9 Power Equipment and Cabling (M)(H) | | | | | no data |
| γπΌ PE-10 Emergency Shutoff (M)(H) | | | | | no data |
| γπΌ PE-11 Emergency Power (M)(H) | 1 | | | | no data |
| γγπΌ PE-11(1) Alternate Power Supply β Minimal Operational Capability (H) | | | | | no data |
| γπΌ PE-12 Emergency Lighting (L)(M)(H) | | | | | no data |
| γπΌ PE-13 Fire Protection (L)(M)(H) | 2 | | | | no data |
| γγπΌ PE-13(1) Detection Systems β Automatic Activation and Notification (M)(H) | | | | | no data |
| γγπΌ PE-13(2) Suppression Systems β Automatic Activation and Notification (M)(H) | | | | | no data |
| γπΌ PE-14 Environmental Controls (L)(M)(H) | 1 | | | | no data |
| γγπΌ PE-14(2) Monitoring with Alarms and Notifications (H) | | | | | no data |
| γπΌ PE-15 Water Damage Protection (L)(M)(H) | 1 | | | | no data |
| γγπΌ PE-15(1) Automation Support (H) | | | | | no data |
| γπΌ PE-16 Delivery and Removal (L)(M)(H) | | | | | no data |
| γπΌ PE-17 Alternate Work Site (M)(H) | | | | | no data |
| γπΌ PE-18 Location of System Components (H) | | | | | no data |
| πΌ Planning | 6 | | 3 | | no data |
| γπΌ PL-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ PL-2 System Security and Privacy Plans (L)(M)(H) | | | | | no data |
| γπΌ PL-4 Rules of Behavior (L)(M)(H) | 1 | | | | no data |
| γγπΌ PL-4(1) Social Media and External Site/Application Usage Restrictions (L)(M)(H) | | | | | no data |
| γπΌ PL-8 Security and Privacy Architectures (L)(M)(H) | | | 3 | | no data |
| γπΌ PL-10 Baseline Selection (L)(M)(H) | | | | | no data |
| γπΌ PL-11 Baseline Tailoring (L)(M)(H) | | | | | no data |
| πΌ Risk Assessment | 6 | 7 | 8 | | no data |
| γπΌ RA-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ RA-2 Security Categorization (L)(M)(H) | | | | | no data |
| γπΌ RA-3 Risk Assessment (L)(M)(H) | 1 | 7 | 7 | | no data |
| γγπΌ RA-3(1) Supply Chain Risk Assessment (L)(M)(H) | | | | | no data |
| γπΌ RA-5 Vulnerability Monitoring and Scanning (L)(M)(H) | 6 | 7 | 8 | | no data |
| γγπΌ RA-5(2) Update Vulnerabilities to Be Scanned (L)(M)(H) | | | | | no data |
| γγπΌ RA-5(3) Breadth and Depth of Coverage (M)(H) | | | | | no data |
| γγπΌ RA-5(4) Discoverable Information (H) | | | | | no data |
| γγπΌ RA-5(5) Privileged Access (M)(H) | | | | | no data |
| γγπΌ RA-5(8) Review Historic Audit Logs (H) | | | | | no data |
| γγπΌ RA-5(11) Public Disclosure Program (L)(M)(H) | | | | | no data |
| γπΌ RA-7 Risk Response (L)(M)(H) | | | | | no data |
| γπΌ RA-9 Criticality Analysis (M)(H) | | | | | no data |
| πΌ Supply Chain Risk Management | 10 | | | | no data |
| γπΌ SR-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ SR-2 Supply Chain Risk Management Plan (L)(M)(H) | 1 | | | | no data |
| γγπΌ SR-2(1) Establish SCRM Team (L)(M)(H) | | | | | no data |
| γπΌ SR-3 Supply Chain Controls and Processes (L)(M)(H) | | | | | no data |
| γπΌ SR-5 Acquisition Strategies, Tools, and Methods (L)(M)(H) | | | | | no data |
| γπΌ SR-6 Supplier Assessments and Reviews (M)(H) | | | | | no data |
| γπΌ SR-8 Notification Agreements (L)(M)(H) | | | | | no data |
| γπΌ SR-9 Tamper Resistance and Detection (H) | 1 | | | | no data |
| γγπΌ SR-9(1) Multiple Stages of System Development Life Cycle (H) | | | | | no data |
| γπΌ SR-10 Inspection of Systems or Components (L)(M)(H) | | | | | no data |
| γπΌ SR-11 Component Authenticity (L)(M)(H) | 2 | | | | no data |
| γγπΌ SR-11(1) Anti-counterfeit Training (L)(M)(H) | | | | | no data |
| γγπΌ SR-11(2) Configuration Control for Component Service and Repair (L)(M)(H) | | | | | no data |
| γπΌ SR-12 Component Disposal (L)(M)(H) | | | | | no data |
| πΌ System and Communications Protection | 21 | 25 | 77 | | no data |
| γπΌ SC-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ SC-2 Separation of System and User Functionality (M)(H) | | | | | no data |
| γπΌ SC-3 Security Function Isolation (H) | | | | | no data |
| γπΌ SC-4 Information in Shared System Resources (M)(H) | | | | | no data |
| γπΌ SC-5 Denial-of-service Protection (L)(M)(H) | | | 1 | | no data |
| γπΌ SC-7 Boundary Protection (L)(M)(H) | 10 | 8 | 50 | | no data |
| γγπΌ SC-7(3) Access Points (M)(H) | | | 8 | | no data |
| γγπΌ SC-7(4) External Telecommunications Services (M)(H) | | | 28 | | no data |
| γγπΌ SC-7(5) Deny by Default β Allow by Exception (M)(H) | | | 18 | | no data |
| γγπΌ SC-7(7) Split Tunneling for Remote Devices (M)(H) | | | | | no data |
| γγπΌ SC-7(8) Route Traffic to Authenticated Proxy Servers (M)(H) | | | | | no data |
| γγπΌ SC-7(10) Prevent Exfiltration (H) | | | 6 | | no data |
| γγπΌ SC-7(12) Host-based Protection (M)(H) | | | | | no data |
| γγπΌ SC-7(18) Fail Secure (M)(H) | | | | | no data |
| γγπΌ SC-7(20) Dynamic Isolation and Segregation (H) | | | 8 | | no data |
| γγπΌ SC-7(21) Isolation of System Components (H) | | | 24 | | no data |
| γπΌ SC-8 Transmission Confidentiality and Integrity (L)(M)(H) | 1 | 8 | 17 | | no data |
| γγπΌ SC-8(1) Cryptographic Protection (L)(M)(H) | | 8 | 16 | | no data |
| γπΌ SC-10 Network Disconnect (M)(H) | | | | | no data |
| γπΌ SC-12 Cryptographic Key Establishment and Management (L)(M)(H) | 1 | 9 | 11 | | no data |
| γγπΌ SC-12(1) Availability (H) | | | | | no data |
| γπΌ SC-13 Cryptographic Protection (L)(M)(H) | | 16 | 24 | | no data |
| γπΌ SC-15 Collaborative Computing Devices and Applications (L)(M)(H) | | | | | no data |
| γπΌ SC-17 Public Key Infrastructure Certificates (M)(H) | | 2 | 2 | | no data |
| γπΌ SC-18 Mobile Code (M)(H) | | | | | no data |
| γπΌ SC-20 Secure Name/Address Resolution Service (Authoritative Source) (L)(M)(H) | | | | | no data |
| γπΌ SC-21 Secure Name/Address Resolution Service (Recursive or Caching Resolver) (L)(M)(H) | | | | | no data |
| γπΌ SC-22 Architecture and Provisioning for Name/Address Resolution Service (L)(M)(H) | | | | | no data |
| γπΌ SC-23 Session Authenticity (M)(H) | | 7 | 13 | | no data |
| γπΌ SC-24 Fail in Known State (H) | | | | | no data |
| γπΌ SC-28 Protection of Information at Rest (L)(M)(H) | 1 | 7 | 24 | | no data |
| γγπΌ SC-28(1) Cryptographic Protection (L)(M)(H) | | 5 | 14 | | no data |
| γπΌ SC-39 Process Isolation (L)(M)(H) | | | | | no data |
| γπΌ SC-45 System Time Synchronization (M)(H) | 1 | | | | no data |
| γγπΌ SC-45(1) Synchronization with Authoritative Time Source (M)(H) | | | | | no data |
| πΌ System and Information Integrity | 12 | 57 | 75 | | no data |
| γπΌ SI-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ SI-2 Flaw Remediation (L)(M)(H) | 2 | 7 | 14 | | no data |
| γγπΌ SI-2(2) Automated Flaw Remediation Status (M)(H) | | | 4 | | no data |
| γγπΌ SI-2(3) Time to Remediate Flaws and Benchmarks for Corrective Actions (M)(H) | | | | | no data |
| γπΌ SI-3 Malicious Code Protection (L)(M)(H) | | 7 | 7 | | no data |
| γπΌ SI-4 System Monitoring (L)(M)(H) | 14 | 50 | 56 | | no data |
| γγπΌ SI-4(1) System-wide Intrusion Detection System (M)(H) | | 1 | 2 | | no data |
| γγπΌ SI-4(2) Automated Tools and Mechanisms for Real-time Analysis (M)(H) | | | 1 | | no data |
| γγπΌ SI-4(4) Inbound and Outbound Communications Traffic (M)(H) | | 6 | 8 | | no data |
| γγπΌ SI-4(5) System-generated Alerts (M)(H) | | | 2 | | no data |
| γγπΌ SI-4(10) Visibility of Encrypted Communications (H) | | | | | no data |
| γγπΌ SI-4(11) Analyze Communications Traffic Anomalies (H) | | | | | no data |
| γγπΌ SI-4(12) Automated Organization-generated Alerts (H) | | | 1 | | no data |
| γγπΌ SI-4(14) Wireless Intrusion Detection (H) | | | | | no data |
| γγπΌ SI-4(16) Correlate Monitoring Information (M)(H) | | | | | no data |
| γγπΌ SI-4(18) Analyze Traffic and Covert Exfiltration (M)(H) | | | | | no data |
| γγπΌ SI-4(19) Risk for Individuals (H) | | | | | no data |
| γγπΌ SI-4(20) Privileged Users (H) | | 48 | 51 | | no data |
| γγπΌ SI-4(22) Unauthorized Network Services (H) | | | 1 | | no data |
| γγπΌ SI-4(23) Host-based Devices (M)(H) | | | | | no data |
| γπΌ SI-5 Security Alerts, Advisories, and Directives (L)(M)(H) | 1 | | | | no data |
| γγπΌ SI-5(1) Automated Alerts and Advisories (H) | | | | | no data |
| γπΌ SI-6 Security and Privacy Function Verification (M)(H) | | | | | no data |
| γπΌ SI-7 Software, Firmware, and Information Integrity (M)(H) | 5 | | 2 | | no data |
| γγπΌ SI-7(1) Integrity Checks (M)(H) | | | 1 | | no data |
| γγπΌ SI-7(2) Automated Notifications of Integrity Violations (H) | | | | | no data |
| γγπΌ SI-7(5) Automated Response to Integrity Violations (H) | | | | | no data |
| γγπΌ SI-7(7) Integration of Detection and Response (M)(H) | | | 1 | | no data |
| γγπΌ SI-7(15) Code Authentication (H) | | | | | no data |
| γπΌ SI-8 Spam Protection (M)(H) | 1 | | | | no data |
| γγπΌ SI-8(2) Automatic Updates (M)(H) | | | | | no data |
| γπΌ SI-10 Information Input Validation (M)(H) | | | | | no data |
| γπΌ SI-11 Error Handling (M)(H) | | | | | no data |
| γπΌ SI-12 Information Management and Retention (L)(M)(H) | | | 5 | | no data |
| γπΌ SI-16 Memory Protection (M)(H) | | | | | no data |
| πΌ System and Services Acquisition | 14 | | 9 | | no data |
| γπΌ SA-1 Policy and Procedures (L)(M)(H) | | | | | no data |
| γπΌ SA-2 Allocation of Resources (L)(M)(H) | | | | | no data |
| γπΌ SA-3 System Development Life Cycle (L)(M)(H) | | | 4 | | no data |
| γπΌ SA-4 Acquisition Process (L)(M)(H) | 5 | | | | no data |
| γγπΌ SA-4(1) Functional Properties of Controls (M)(H) | | | | | no data |
| γγπΌ SA-4(2) Design and Implementation Information for Controls (M)(H) | | | | | no data |
| γγπΌ SA-4(5) System, Component, and Service Configurations (H) | | | | | no data |
| γγπΌ SA-4(9) Functions, Ports, Protocols, and Services in Use (M)(H) | | | | | no data |
| γγπΌ SA-4(10) Use of Approved PIV Products (L)(M)(H) | | | | | no data |
| γπΌ SA-5 System Documentation (L)(M)(H) | | | | | no data |
| γπΌ SA-8 Security and Privacy Engineering Principles (L)(M)(H) | | | 6 | | no data |
| γπΌ SA-9 External System Services (L)(M)(H) | 3 | | 1 | | no data |
| γγπΌ SA-9(1) Risk Assessments and Organizational Approvals (M)(H) | | | | | no data |
| γγπΌ SA-9(2) Identification of Functions, Ports, Protocols, and Services (M)(H) | | | | | no data |
| γγπΌ SA-9(5) Processing, Storage, and Service Location (M)(H) | | | 1 | | no data |
| γπΌ SA-10 Developer Configuration Management (M)(H) | | | 3 | | no data |
| γπΌ SA-11 Developer Testing and Evaluation (M)(H) | 2 | | 1 | | no data |
| γγπΌ SA-11(1) Static Code Analysis (M)(H) | | | 1 | | no data |
| γγπΌ SA-11(2) Threat Modeling and Vulnerability Analyses (M)(H) | | | | | no data |
| γπΌ SA-15 Development Process, Standards, and Tools (M)(H) | 1 | | | | no data |
| γγπΌ SA-15(3) Criticality Analysis (M)(H) | | | | | no data |
| γπΌ SA-16 Developer-provided Training (H) | | | | | no data |
| γπΌ SA-17 Developer Security and Privacy Architecture and Design (H) | | | | | no data |
| γπΌ SA-21 Developer Screening (H) | | | | | no data |
| γπΌ SA-22 Unsupported System Components (L)(M)(H) | | | | | no data |