Ontolocy[Explore]
Controls
Intel
Risk
ATT&CK
NIST SP800-53 Controls
Home
Controls
SP800-53
Search:
Node
SR-9: Tamper Resistance and Detection
SR-8: Notification Agreements
SR-7: Supply Chain Operations Security
SR-6: Supplier Assessments and Reviews
SR-5: Acquisition Strategies, Tools, and Methods
SR-4: Provenance
SR-3: Supply Chain Controls and Processes
SR-2: Supply Chain Risk Management Plan
SR-12: Component Disposal
SR-11: Component Authenticity
SR-10: Inspection of Systems or Components
SR-1: Policy and Procedures
SI-9: Information Input Restrictions
SI-8: Spam Protection
SI-7: Software, Firmware, and Information Integrity
SI-6: Security and Privacy Function Verification
SI-5: Security Alerts, Advisories, and Directives
SI-4: System Monitoring
SI-3: Malicious Code Protection
SI-23: Information Fragmentation
SI-22: Information Diversity
SI-21: Information Refresh
SI-20: Tainting
SI-2: Flaw Remediation
SI-19: De-identification
SI-18: Personally Identifiable Information Quality Operations
SI-17: Fail-safe Procedures
SI-16: Memory Protection
SI-15: Information Output Filtering
SI-14: Non-persistence
SI-13: Predictable Failure Prevention
SI-12: Information Management and Retention
SI-11: Error Handling
SI-10: Information Input Validation
SI-1: Policy and Procedures
SC-9: Transmission Confidentiality
SC-8: Transmission Confidentiality and Integrity
SC-7: Boundary Protection
SC-6: Resource Availability
SC-51: Hardware-based Protection
SC-50: Software-enforced Separation and Policy Enforcement
SC-5: Denial-of-service Protection
SC-49: Hardware-enforced Separation and Policy Enforcement
SC-48: Sensor Relocation
SC-47: Alternate Communications Paths
SC-46: Cross Domain Policy Enforcement
SC-45: System Time Synchronization
SC-44: Detonation Chambers
SC-43: Usage Restrictions
SC-42: Sensor Capability and Data
Showing 1 to 50 of 322 entries
Previous
1
2
3
4
5
6
7
Next