800-53r2 800-53r3 Comparison

From FISMApedia
Jump to: navigation, search
REV 2 CNTL NO REV 3 CNTL NO REV 2 CONTROL NAME REV 3 CONTROL NAME PRIORITY CONTROL BASELINES STATUS
REV 2 LOW REV 3 LOW REV 2 MOD REV 3 MOD REV 2 HIGH REV 3 HIGH
Access Control
AC-1 AC-1 Access Control Policy and Procedures Access Control Policy and Procedures P1 AC-1 AC-1 AC-1 AC-1 AC-1 AC-1   
AC-2 AC-2 Account Management Account Management P1 AC-2 AC-2 AC-2 (1) (2) (3) (4) AC-2 (1) (2) (3) (4) AC-2 (1) (2) (3) (4) AC-2 (1) (2) (3) (4)   
AC-3 AC-3 Access Enforcement Access Enforcement P1 AC-3 AC-3 AC-3 (1) AC-3 AC-3 (1) AC-3   
AC-4 AC-4 Information Flow Enforcement Information Flow Enforcement P1 Not Selected Not Selected AC-4 AC-4 AC-4 AC-4   
AC-5 AC-5 Separation of Duties Separation of Duties P1 Not Selected Not Selected AC-5 AC-5 AC-5 AC-5   
AC-6 AC-6 Least Privilege Least Privilege P1 Not Selected Not Selected AC-6 AC-6 (1) (2) AC-6 AC-6 (1) (2)   
AC-7 AC-7 Unsuccessful Login Attempts Unsuccessful Login Attempts P2 AC-7 AC-7 AC-7 AC-7 AC-7 AC-7   
AC-8 AC-8 System Use Notification System Use Notification P1 AC-8 AC-8 AC-8 AC-8 AC-8 AC-8   
AC-9 AC-9 Previous Logon Notification Previous Logon (Access) Notification P0 Not Selected Not Selected Not Selected Not Selected Not Selected Not Selected   
AC-10 AC-10 Concurrent Session Control Concurrent Session Control P2 Not Selected Not Selected Not Selected Not Selected AC-10 AC-10   
AC-11 AC-11 Session Lock Session Lock P3 Not Selected Not Selected AC-11 AC-11 AC-11 AC-11   
AC-12 AC-12 Session Termination Session Termination (Withdrawn) --- Not Selected --- AC-12 --- AC-12 (1) --- Withdrawn
AC-13 AC-13 Supervision and Review-Access Control Supervision and Review-Access Control (Withdrawn) --- AC-13 --- AC-13 (1) --- AC-13 (1) --- Withdrawn
AC-14 AC-14 Permitted Actions without Identification or Authentication Permitted Actions without Identification or Authentication P1 AC-14 AC-14 AC-14 (1) AC-14 (1) AC-14 (1) AC-14 (1)   
AC-15 AC-15 Automated Marking Automated Marking (Withdrawn) --- Not Selected --- Not Selected --- AC-15 --- Withdrawn
AC-16 AC-16 Automated Labeling Security Attributes P0 Not Selected Not Selected Not Selected Not Selected Not Selected Not Selected   
AC-17 AC-17 Remote Access Remote Access P1 AC-17 AC-17 AC-17 (1) (2) (3) (4) AC-17 (1) (2) (3) (4) (5) (7) (8) AC-17 (1) (2) (3) (4) AC-17 (1) (2) (3) (4) (5) (7) (8)   
AC-18 AC-18 Wireless Access Restrictions Wireless Access P1 AC-18 AC-18 AC-18 (1) AC-18 (1) AC-18 (1) (2) AC-18 (1) (2) (4) (5)   
AC-19 AC-19 Access Control for Portable and Mobile Devices Access Control for Mobile Devices P1 Not Selected AC-19 AC-19 AC-19 (1) (2) (3) AC-19 AC-19 (1) (2) (3)   
AC-20 AC-20 Use of External Information Systems Use of External Information Systems P1 AC-20 AC-20 AC-20 (1) AC-20 (1) (2) AC-20 (1) AC-20 (1) (2)   
   AC-21    User-Based Collaboration and Information Sharing P0    Not Selected    Not Selected    Not Selected New
   AC-22    Publicly Accessible Content P2    AC-22    AC-22    AC-22 New
Awareness and Training
AT-1 AT-1 Security Awareness and Training Policy and Procedures Security Awareness and Training Policy and Procedures P1 AT-1 AT-1 AT-1 AT-1 AT-1 AT-1   
AT-2 AT-2 Security Awareness Security Awareness P1 AT-2 AT-2 AT-2 AT-2 AT-2 AT-2   
AT-3 AT-3 Security Training Security Training P1 AT-3 AT-3 AT-3 AT-3 AT-3 AT-3   
AT-4 AT-4 Security Training Records Security Training Records P3 AT-4 AT-4 AT-4 AT-4 AT-4 AT-4   
AT-5 AT-5 Contacts with Security Groups and Associations Contacts with Security Groups and Associations P0 Not Selected Not Selected Not Selected Not Selected Not Selected Not Selected   
Audit and Accountability
AU-1 AU-1 Audit and Accountability Policy and Procedures Audit and Accountability Policy and Procedures P1 AU-1 AU-1 AU-1 AU-1 AU-1 AU-1   
AU-2 AU-2 Auditable Events Auditable Events P1 AU-2 AU-2 AU-2 (3) AU-2 (3) (4) AU-2 (1) (2) (3) AU-2 (3) (4)   
AU-3 AU-3 Content of Audit Records Content of Audit Records P1 AU-3 AU-3 AU-3 (1) AU-3 (1) AU-3 (1) (2) AU-3 (1) (2)   
AU-4 AU-4 Audit Storage Capacity Audit Storage Capacity P1 AU-4 AU-4 AU-4 AU-4 AU-4 AU-4   
AU-5 AU-5 Response to Audit Processing Failures Response to Audit Processing Failures P1 AU-5 AU-5 AU-5 AU-5 AU-5 (1) (2) AU-5 (1) (2)   
AU-6 AU-6 Audit Monitoring, Analysis, and Reporting Audit Review, Analysis, and Reporting P1 Not Selected AU-6 AU-6 (2) AU-6 AU-6 (1) (2) AU-6 (1)   
AU-7 AU-7 Audit Reduction and Report Generation Audit Reduction and Report Generation P2 Not Selected Not Selected AU-7 (1) AU-7 (1) AU-7 (1) AU-7 (1)   
AU-8 AU-8 Time Stamps Time Stamps P1 AU-8 AU-8 AU-8 (1) AU-8 (1) AU-8 (1) AU-8 (1)   
AU-9 AU-9 Protection of Audit Information Protection of Audit Information P1 AU-9 AU-9 AU-9 AU-9 AU-9 AU-9   
AU-10 AU-10 Non-repudiation Non-repudiation P1 Not Selected Not Selected Not Selected Not Selected Not Selected AU-10   
AU-11 AU-11 Audit Record Retention Audit Record Retention P3 AU-11 AU-11 AU-11 AU-11 AU-11 AU-11   
   AU-12    Audit Generation P1    AU-12    AU-12    AU-12 (1) New
   AU-13    Monitoring for Information Disclosure P0    Not Selected    Not Selected    Not Selected New
   AU-14    Session Audit P0    Not Selected    Not Selected    Not Selected New
Certification, Accreditation, and Security Assessments / Security Assessment and Authorization
CA-1 CA-1 Certification, Accreditation, and Security Assessment Policies and Procedures Security Assessment and Authorization Policies and Procedures P1 CA-1 CA-1 CA-1 CA-1 CA-1 CA-1   
CA-2 CA-2 Security Assessments Security Assessments P2 CA-2 CA-2 CA-2 CA-2 (1) CA-2 CA-2 (1) (2)   
CA-3 CA-3 Information System Connections Information System Connections P1 CA-3 CA-3 CA-3 CA-3 CA-3 CA-3   
CA-4 CA-4 Security Certification Security Certification (Withdrawn) --- CA-4 --- CA-4 (1) --- CA-4 (1) --- Withdrawn
CA-5 CA-5 Plan of Action and Milestones Plan of Action and Milestones P3 CA-5 CA-5 CA-5 CA-5 CA-5 CA-5   
CA-6 CA-6 Security Accreditation Security Authorization P3 CA-6 CA-6 CA-6 CA-6 CA-6 CA-6   
CA-7 CA-7 Continuous Monitoring Continuous Monitoring P3 CA-7 CA-7 CA-7 CA-7 CA-7 CA-7   
Configuration Management
CM-1 CM-1 Configuration Management Policy and Procedures Configuration Management Policy and Procedures P1 CM-1 CM-1 CM-1 CM-1 CM-1 CM-1   
CM-2 CM-2 Baseline Configuration Baseline Configuration P1 CM-2 CM-2 CM-2 (1) CM-2 (1) (3) (4) CM-2 (1) (2) CM-2 (1) (2) (3) (5) (6)   
CM-3 CM-3 Configuration Change Control Configuration Change Control P1 Not Selected Not Selected CM-3 CM-3 (2) CM-3 (1) CM-3 (1) (2)   
CM-4 CM-4 Monitoring Configuration Changes Security Impact Analysis P2 Not Selected CM-4 CM-4 CM-4 CM-4 CM-4 (1)   
CM-5 CM-5 Access Restrictions for Change Access Restrictions for Change P1 Not Selected Not Selected CM-5 CM-5 CM-5 (1) CM-5 (1) (2) (3)   
CM-6 CM-6 Configuration Settings Configuration Settings P1 CM-6 CM-6 CM-6 CM-6 (3) CM-6 (1) CM-6 (1) (2) (3)   
CM-7 CM-7 Least Functionality Least Functionality P1 Not Selected CM-7 CM-7 CM-7 (1) CM-7 (1) CM-7 (1) (2)   
CM-8 CM-8 Information System Component Inventory Information System Component Inventory P1 CM-8 CM-8 CM-8 (1) CM-8 (1) (5) CM-8 (1) (2) CM-8 (1) (2) (3) (4) (5)   
   CM-9    Configuration Management Plan P1    Not Selected    CM-9    CM-9 New
Contingency Planning
CP-1 CP-1 Contingency Planning Policy and Procedures Contingency Planning Policy and Procedures P1 CP-1 CP-1 CP-1 CP-1 CP-1 CP-1   
CP-2 CP-2 Contingency Plan Contingency Plan P1 CP-2 CP-2 CP-2 (1) CP-2 (1) CP-2 (1) (2) CP-2 (1) (2) (3)   
CP-3 CP-3 Contingency Training Contingency Training P2 Not Selected CP-3 CP-3 CP-3 CP-3 (1) CP-3 (1)   
CP-4 CP-4 Contingency Plan Testing and Exercises Contingency Plan Testing and Exercises P2 CP-4 CP-4 CP-4 (1) CP-4 (1) CP-4 (1) (2) CP-4 (1) (2) (4)   
CP-5 CP-5 Contingency Plan Update Contingency Plan Update (Withdrawn) --- CP-5 --- CP-5 --- CP-5 --- Withdrawn
CP-6 CP-6 Alternate Storage Site Alternate Storage Site P1 Not Selected Not Selected CP-6 (1) (3) CP-6 (1) (3) CP-6 (1) (2) (3) CP-6 (1) (2) (3)   
CP-7 CP-7 Alternate Processing Site Alternate Processing Site P1 Not Selected Not Selected CP-7 (1) (2) (3) CP-7 (1) (2) (3) (5) CP-7 (1) (2) (3) (4) CP-7 (1) (2) (3) (4) (5)   
CP-8 CP-8 Telecommunications Services Telecommunications Services P1 Not Selected Not Selected CP-8 (1) (2) CP-8 (1) (2) CP-8 (1) (2) (3) (4) CP-8 (1) (2) (3) (4)   
CP-9 CP-9 Information System Backup Information System Backup P1 CP-9 CP-9 CP-9 (1) (4) CP-9 (1) CP-9 (1) (2) (3) (4) CP-9 (1) (2) (3)   
CP-10 CP-10 Information System Recovery and Reconstitution Information System Recovery and Reconstitution P1 CP-10 CP-10 CP-10 CP-10 (2) (3) CP-10 (1) CP-10 (2) (3) (4)   
Identification and Authentication
IA-1 IA-1 Identification and Authentication Policy and Procedures Identification and Authentication Policy and Procedures P1 IA-1 IA-1 IA-1 IA-1 IA-1 IA-1   
IA-2 IA-2 User Identification and Authentication Identification and Authentication (Organizational Users) P1 IA-2 IA-2 (1) IA-2 (1) IA-2 (1) (2) (3) (8) IA-2 (2) (3) IA-2 (1) (2) (3) (4) (8) (9)   
IA-3 IA-3 Device Identification and Authentication Device Identification and Authentication P1 Not Selected Not Selected IA-3 IA-3 IA-3 IA-3   
IA-4 IA-4 Identifier Management Identifier Management P1 IA-4 IA-4 IA-4 IA-4 IA-4 IA-4   
IA-5 IA-5 Authenticator Management Authenticator Management P1 IA-5 IA-5 (1) IA-5 IA-5 (1) (2) (3) IA-5 IA-5 (1) (2) (3)   
IA-6 IA-6 Authenticator Feedback Authenticator Feedback P1 IA-6 IA-6 IA-6 IA-6 IA-6 IA-6   
IA-7 IA-7 Cryptographic Module Authentication Cryptographic Module Authentication P1 IA-7 IA-7 IA-7 IA-7 IA-7 IA-7   
   IA-8    Identification and Authentication (Non-Organizational Users) P1    IA-8    IA-8    IA-8 New
Incident Response
IR-1 IR-1 Incident Response Policy and Procedures Incident Response Policy and Procedures P1 IR-1 IR-1 IR-1 IR-1 IR-1 IR-1   
IR-2 IR-2 Incident Response Training Incident Response Training P2 Not Selected IR-2 IR-2 IR-2 IR-2 (1) IR-2 (1) (2)   
IR-3 IR-3 Incident Response Testing and Exercises Incident Response Testing and Exercises P2 Not Selected Not Selected IR-3 IR-3 IR-3 (1) IR-3 (1)   
IR-4 IR-4 Incident Handling Incident Handling P1 IR-4 IR-4 IR-4 (1) IR-4 (1) IR-4 (1) IR-4 (1)   
IR-5 IR-5 Incident Monitoring Incident Monitoring P1 Not Selected IR-5 IR-5 IR-5 IR-5 (1) IR-5 (1)   
IR-6 IR-6 Incident Reporting Incident Reporting P1 IR-6 IR-6 IR-6 (1) IR-6 (1) IR-6 (1) IR-6 (1)   
IR-7 IR-7 Incident Response Assistance Incident Response Assistance P3 IR-7 IR-7 IR-7 (1) IR-7 (1) IR-7 (1) IR-7 (1)   
   IR-8    Incident Response Plan P1    IR-8    IR-8    IR-8 New
Maintenance
MA-1 MA-1 System Maintenance Policy and Procedures System Maintenance Policy and Procedures P1 MA-1 MA-1 MA-1 MA-1 MA-1 MA-1   
MA-2 MA-2 Controlled Maintenance Controlled Maintenance P2 MA-2 MA-2 MA-2 (1) MA-2 (1) MA-2 (1) (2) MA-2 (1) (2)   
MA-3 MA-3 Maintenance Tools Maintenance Tools P2 Not Selected Not Selected MA-3 MA-3 (1) (2) MA-3 (1) (2) (3) MA-3 (1) (2) (3)   
MA-4 MA-4 Remote Maintenance Non-Local Maintenance P1 MA-4 MA-4 MA-4 (1) (2) MA-4 (1) (2) MA-4 (1) (2) (3) MA-4 (1) (2) (3)   
MA-5 MA-5 Maintenance Personnel Maintenance Personnel P1 MA-5 MA-5 MA-5 MA-5 MA-5 MA-5   
MA-6 MA-6 Timely Maintenance Timely Maintenance P1 Not Selected Not Selected MA-6 MA-6 MA-6 MA-6   
Media Protection
MP-1 MP-1 Media Protection Policy and Procedures Media Protection Policy and Procedures P1 MP-1 MP-1 MP-1 MP-1 MP-1 MP-1   
MP-2 MP-2 Media Access Media Access P1 MP-2 MP-2 MP-2 (1) MP-2 (1) MP-2 (1) MP-2 (1)   
MP-3 MP-3 Media Labeling Media Marking P1 Not Selected Not Selected Not Selected MP-3 MP-3 MP-3   
MP-4 MP-4 Media Storage Media Storage P1 Not Selected Not Selected MP-4 MP-4 MP-4 MP-4   
MP-5 MP-5 Media Transport Media Transport P1 Not Selected Not Selected MP-5 (1) (2) MP-5 (2) (4) MP-5 (1) (2) (3) MP-5 (2) (3) (4)   
MP-6 MP-6 Media Sanitization and Disposal Media Sanitization P1 MP-6 MP-6 MP-6 MP-6 MP-6 (1) (2) MP-6 (1) (2) (3)   
Physical and Environmental Protection
PE-1 PE-1 Physical and Environmental Protection Policy and Procedures Physical and Environmental Protection Policy and Procedures P1 PE-1 PE-1 PE-1 PE-1 PE-1 PE-1   
PE-2 PE-2 Physical Access Authorizations Physical Access Authorizations P1 PE-2 PE-2 PE-2 PE-2 PE-2 PE-2   
PE-3 PE-3 Physical Access Control Physical Access Control P1 PE-3 PE-3 PE-3 PE-3 PE-3 (1) PE-3 (1)   
PE-4 PE-4 Access Control for Transmission Medium Access Control for Transmission Medium P1 Not Selected Not Selected Not Selected PE-4 PE-4 PE-4   
PE-5 PE-5 Access Control for Display Medium Access Control for Output Devices P1 Not Selected Not Selected PE-5 PE-5 PE-5 PE-5   
PE-6 PE-6 Monitoring Physical Access Monitoring Physical Access P1 PE-6 PE-6 PE-6 (1) PE-6 (1) PE-6 (1) (2) PE-6 (1) (2)   
PE-7 PE-7 Visitor Control Visitor Control P1 PE-7 PE-7 PE-7 (1) PE-7 (1) PE-7 (1) PE-7 (1)   
PE-8 PE-8 Access Records Access Records P3 PE-8 PE-8 PE-8 PE-8 PE-8 (1) (2) PE-8 (1) (2)   
PE-9 PE-9 Power Equipment and Power Cabling Power Equipment and Power Cabling P1 Not Selected Not Selected PE-9 PE-9 PE-9 PE-9   
PE-10 PE-10 Emergency Shutoff Emergency Shutoff P1 Not Selected Not Selected PE-10 PE-10 PE-10 (1) PE-10   
PE-11 PE-11 Emergency Power Emergency Power P1 Not Selected Not Selected PE-11 PE-11 PE-11 (1) PE-11 (1)   
PE-12 PE-12 Emergency Lighting Emergency Lighting P1 PE-12 PE-12 PE-12 PE-12 PE-12 PE-12   
PE-13 PE-13 Fire Protection Fire Protection P1 PE-13 PE-13 PE-13 (1) (2) (3) PE-13 (1) (2) (3) PE-13 (1) (2) (3) PE-13 (1) (2) (3)   
PE-14 PE-14 Temperature and Humidity Controls Temperature and Humidity Controls P1 PE-14 PE-14 PE-14 PE-14 PE-14 PE-14   
PE-15 PE-15 Water Damage Protection Water Damage Protection P1 PE-15 PE-15 PE-15 PE-15 PE-15 (1) PE-15 (1)   
PE-16 PE-16 Delivery and Removal Delivery and Removal P1 PE-16 PE-16 PE-16 PE-16 PE-16 PE-16   
PE-17 PE-17 Alternate Work Site Alternate Work Site P1 Not Selected Not Selected PE-17 PE-17 PE-17 PE-17   
PE-18 PE-18 Location of Information System Components Location of Information System Components P2 Not Selected Not Selected PE-18 PE-18 PE-18 (1) PE-18 (1)   
PE-19 PE-19 Information Leakage Information Leakage P0 Not Selected Not Selected Not Selected Not Selected Not Selected Not Selected   
Planning
PL-1 PL-1 Security Planning Policy and Procedures Security Planning Policy and Procedures P1 PL-1 PL-1 PL-1 PL-1 PL-1 PL-1   
PL-2 PL-2 System Security Plan System Security Plan P1 PL-2 PL-2 PL-2 PL-2 PL-2 PL-2   
PL-3 PL-3 System Security Plan Update System Security Plan Update (Withdrawn) --- PL-3 --- PL-3 --- PL-3 --- Withdrawn
PL-4 PL-4 Rules of Behavior Rules of Behavior P1 PL-4 PL-4 PL-4 PL-4 PL-4 PL-4   
PL-5 PL-5 Privacy Impact Assessment Privacy Impact Assessment P1 PL-5 PL-5 PL-5 PL-5 PL-5 PL-5   
PL-6 PL-6 Security-Related Activity Planning Security-Related Activity Planning P3 Not Selected Not Selected PL-6 PL-6 PL-6 PL-6   
Personnel Security
PS-1 PS-1 Personnel Security Policy and Procedures Personnel Security Policy and Procedures P1 PS-1 PS-1 PS-1 PS-1 PS-1 PS-1   
PS-2 PS-2 Position Categorization Position Categorization P1 PS-2 PS-2 PS-2 PS-2 PS-2 PS-2   
PS-3 PS-3 Personnel Screening Personnel Screening P1 PS-3 PS-3 PS-3 PS-3 PS-3 PS-3   
PS-4 PS-4 Personnel Termination Personnel Termination P2 PS-4 PS-4 PS-4 PS-4 PS-4 PS-4   
PS-5 PS-5 Personnel Transfer Personnel Transfer P2 PS-5 PS-5 PS-5 PS-5 PS-5 PS-5   
PS-6 PS-6 Access Agreements Access Agreements P3 PS-6 PS-6 PS-6 PS-6 PS-6 PS-6   
PS-7 PS-7 Third-Party Personnel Security Third-Party Personnel Security P1 PS-7 PS-7 PS-7 PS-7 PS-7 PS-7   
PS-8 PS-8 Personnel Sanctions Personnel Sanctions P3 PS-8 PS-8 PS-8 PS-8 PS-8 PS-8   
Risk Assessment
RA-1 RA-1 Risk Assessment Policy and Procedures Risk Assessment Policy and Procedures P1 RA-1 RA-1 RA-1 RA-1 RA-1 RA-1   
RA-2 RA-2 Security Categorization Security Categorization P1 RA-2 RA-2 RA-2 RA-2 RA-2 RA-2   
RA-3 RA-3 Risk Assessment Risk Assessment P1 RA-3 RA-3 RA-3 RA-3 RA-3 RA-3   
RA-4 RA-4 Risk Assessment Update Risk Assessment Update (Withdrawn) --- RA-4 --- RA-4 --- RA-4 --- Withdrawn
RA-5 RA-5 Vulnerability Scanning Vulnerability Scanning P1 Not Selected RA-5 RA-5 RA-5 (1) RA-5 (1) (2) RA-5 (1) (2) (3) (4) (5) (7)   
System and Services Acquisition
SA-1 SA-1 System and Services Acquisition Policy and Procedures System and Services Acquisition Policy and Procedures P1 SA-1 SA-1 SA-1 SA-1 SA-1 SA-1   
SA-2 SA-2 Allocation of Resources Allocation of Resources P1 SA-2 SA-2 SA-2 SA-2 SA-2 SA-2   
SA-3 SA-3 Life Cycle Support Life Cycle Support P1 SA-3 SA-3 SA-3 SA-3 SA-3 SA-3   
SA-4 SA-4 Acquisitions Acquisitions P1 SA-4 SA-4 SA-4 (1) SA-4 (1) (4) SA-4 (1) SA-4 (1) (2) (4)   
SA-5 SA-5 Information System Documentation Information System Documentation P2 SA-5 SA-5 SA-5 (1) SA-5 (1) (3) SA-5 (1) (2) SA-5 (1) (2) (3)   
SA-6 SA-6 Software Usage Restrictions Software Usage Restrictions P1 SA-6 SA-6 SA-6 SA-6 SA-6 SA-6   
SA-7 SA-7 User Installed Software User-Installed Software P1 SA-7 SA-7 SA-7 SA-7 SA-7 SA-7   
SA-8 SA-8 Security Engineering Principles Security Engineering Principles P1 Not Selected Not Selected SA-8 SA-8 SA-8 SA-8   
SA-9 SA-9 External Information System Services External Information System Services P1 SA-9 SA-9 SA-9 SA-9 SA-9 SA-9   
SA-10 SA-10 Developer Configuration Management Developer Configuration Management P1 Not Selected Not Selected Not Selected SA-10 SA-10 SA-10   
SA-11 SA-11 Developer Security Testing Developer Security Testing P2 Not Selected Not Selected SA-11 SA-11 SA-11 SA-11   
   SA-12    Supply Chain Protection P1    Not Selected    Not Selected    SA-12 New
   SA-13    Trustworthiness P1    Not Selected    Not Selected    SA-13 New
   SA-14    Critical Information System Components P0    Not Selected    Not Selected    Not Selected New
System and Communications Protection
SC-1 SC-1 System and Communications Protection Policy and Procedures System and Communications Protection Policy and Procedures P1 SC-1 SC-1 SC-1 SC-1 SC-1 SC-1   
SC-2 SC-2 Application Partitioning Application Partitioning P1 Not Selected Not Selected SC-2 SC-2 SC-2 SC-2   
SC-3 SC-3 Security Function Isolation Security Function Isolation P1 Not Selected Not Selected Not Selected Not Selected SC-3 SC-3   
SC-4 SC-4 Information Remnance Information in Shared Resources P1 Not Selected Not Selected SC-4 SC-4 SC-4 SC-4   
SC-5 SC-5 Denial of Service Protection Denial of Service Protection P1 SC-5 SC-5 SC-5 SC-5 SC-5 SC-5   
SC-6 SC-6 Resource Priority Resource Priority P0 Not Selected Not Selected Not Selected Not Selected Not Selected Not Selected   
SC-7 SC-7 Boundary Protection Boundary Protection P1 SC-7 SC-7 SC-7 (1) (2) (3) (4) (5) SC-7 (1) (2) (3) (4) (5) (7) SC-7 (1) (2) (3) (4) (5) (6) SC-7 (1) (2) (3) (4) (5) (6) (7) (8)   
SC-8 SC-8 Transmission Integrity Transmission Integrity P1 Not Selected Not Selected SC-8 SC-8 (1) SC-8 (1) SC-8 (1)   
SC-9 SC-9 Transmission Confidentiality Transmission Confidentiality P1 Not Selected Not Selected SC-9 SC-9 (1) SC-9 (1) SC-9 (1)   
SC-10 SC-10 Network Disconnect Network Disconnect P2 Not Selected Not Selected SC-10 SC-10 SC-10 SC-10   
SC-11 SC-11 Trusted Path Trusted Path P0 Not Selected Not Selected Not Selected Not Selected Not Selected Not Selected   
SC-12 SC-12 Cryptographic Key Establishment and Management Cryptographic Key Establishment and Management P1 Not Selected SC-12 SC-12 SC-12 SC-12 SC-12 (1)   
SC-13 SC-13 Use of Cryptography Use of Cryptography P1 SC-13 SC-13 SC-13 SC-13 SC-13 SC-13   
SC-14 SC-14 Public Access Protections Public Access Protections P1 SC-14 SC-14 SC-14 SC-14 SC-14 SC-14   
SC-15 SC-15 Collaborative Computing Collaborative Computing Devices P1 Not Selected SC-15 SC-15 SC-15 SC-15 SC-15   
SC-16 SC-16 Transmission of Security Parameters Transmission of Security Attributes P0 Not Selected Not Selected Not Selected Not Selected Not Selected Not Selected   
SC-17 SC-17 Public Key Infrastructure Certificates Public Key Infrastructure Certificates P1 Not Selected Not Selected SC-17 SC-17 SC-17 SC-17   
SC-18 SC-18 Mobile Code Mobile Code P1 Not Selected Not Selected SC-18 SC-18 SC-18 SC-18   
SC-19 SC-19 Voice Over Internet Protocol Voice Over Internet Protocol P1 Not Selected Not Selected SC-19 SC-19 SC-19 SC-19   
SC-20 SC-20 Secure Name /Address Resolution Service (Authoritative Source) Secure Name /Address Resolution Service (Authoritative Source) P1 Not Selected SC-20 (1) SC-20 SC-20 (1) SC-20 SC-20 (1)   
SC-21 SC-21 Secure Name /Address Resolution Service (Recursive or Caching Resolver) Secure Name /Address Resolution Service (Recursive or Caching Resolver) P1 Not Selected Not Selected Not Selected Not Selected SC-21 SC-21   
SC-22 SC-22 Architecture and Provisioning for Name/Address Resolution Service Architecture and Provisioning for Name/Address Resolution Service P1 Not Selected Not Selected SC-22 SC-22 SC-22 SC-22   
SC-23 SC-23 Session Authenticity Session Authenticity P1 Not Selected Not Selected SC-23 SC-23 SC-23 SC-23   
   SC-24    Fail in Known State P1    Not Selected    Not Selected    SC-24 New
   SC-25    Thin Nodes P0    Not Selected    Not Selected    Not Selected New
   SC-26    Honeypots P0    Not Selected    Not Selected    Not Selected New
   SC-27    Operating System-Independent Applications P0    Not Selected    Not Selected    Not Selected New
   SC-28    Protection of Information at Rest P1    Not Selected    SC-28    SC-28 New
   SC-29    Heterogeneity P0    Not Selected    Not Selected    Not Selected New
   SC-30    Virtualization Techniques P0    Not Selected    Not Selected    Not Selected New
   SC-31    Covert Channel Analysis P0    Not Selected    Not Selected    Not Selected New
   SC-32    Information System Partitioning P0    Not Selected    SC-32    SC-32 New
   SC-33    Transmission Preparation Integrity P0    Not Selected    Not Selected    Not Selected New
   SC-34    Non-Modifiable Executable Programs P0    Not Selected    Not Selected    Not Selected New
System and Information Integrity
SI-1 SI-1 System and Information Integrity Policy and Procedures System and Information Integrity Policy and Procedures P1 SI-1 SI-1 SI-1 SI-1 SI-1 SI-1   
SI-2 SI-2 Flaw Remediation Flaw Remediation P1 SI-2 SI-2 SI-2 (2) SI-2 (2) SI-2 (1) (2) SI-2 (1) (2)   
SI-3 SI-3 Malicious Code Protection Malicious Code Protection P1 SI-3 SI-3 SI-3 (1) (2) SI-3 (1) (2) (3) SI-3 (1) (2) SI-3 (1) (2) (3)   
SI-4 SI-4 Information System Monitoring Tools and Techniques Information System Monitoring P1 Not Selected Not Selected SI-4 (4) SI-4 (2) (4) (5) (6) SI-4 (2) (4) (5) SI-4 (2) (4) (5) (6)   
SI-5 SI-5 Security Alerts and Advisories Security Alerts, Advisories, and Directives P1 SI-5 SI-5 SI-5 SI-5 SI-5 (1) SI-5 (1)   
SI-6 SI-6 Security Functionality Verification Security Functionality Verification P1 Not Selected Not Selected Not Selected Not Selected SI-6 SI-6   
SI-7 SI-7 Software and Information Integrity Software and Information Integrity P1 Not Selected Not Selected Not Selected SI-7 (1) SI-7 (1) (2) SI-7 (1) (2)   
SI-8 SI-8 Spam Protection Spam Protection P1 Not Selected Not Selected SI-8 SI-8 SI-8 (1) SI-8 (1)   
SI-9 SI-9 Information Input Restrictions Information Input Restrictions P2 Not Selected Not Selected SI-9 SI-9 SI-9 SI-9   
SI-10 SI-10 Information Accuracy, Completeness, Validity, and Authenticity Information Input Validation P1 Not Selected Not Selected SI-10 SI-10 SI-10 SI-10   
SI-11 SI-11 Error Handling Error Handling P2 Not Selected Not Selected SI-11 SI-11 SI-11 SI-11   
SI-12 SI-12 Information Output Handling and Retention Information Output Handling and Retention P2 Not Selected SI-12 SI-12 SI-12 SI-12 SI-12   
   SI-13    Predictable Failure Prevention P0    Not Selected    Not Selected    Not Selected New
Program Management
   PM-1    Information Security Program Plan P1                   New
   PM-2    Senior Information Security Officer P1                   New
   PM-3    Information Security Resources P1                   New
   PM-4    Plan of Action and Milestones Process P1                   New
   PM-5    Information System Inventory P1                   New
   PM-6    Information Security Measures of Performance P1                   New
   PM-7    Enterprise Architecture P1                   New
   PM-8    Critical Infrastructure Plan P1                   New
   PM-9    Risk Management Strategy P1                   New
   PM-10    Security Authorization Process P1                   New
   PM-11    Mission/Business Process Definition P1                   New