An introduction to security and privacy controls

Explaining NIST’s 800-53 control families for information systems and organizations

What are the NIST controls?

Federal security compliance is based on evaluating security criteria. Those criteria are a wide-ranging set of considerations called controls. The National Institute for Standards and Technology (NIST) defines these controls in a special publication (SP) called NIST SP 800-53 (Revision 5), Security and Privacy Controls for Information Systems and Organizations.

To use, buy, or build software for the government, you need authorization to operate (ATO). A huge part of that process is documenting how you are addressing the controls in your system security and privacy plan (SSPP). During the ATO process, assessors determine what controls apply to a given system. The higher the risk of the system, the more controls. Then, that system needs to document those considerations and prove that they have taken those security measures into account.

For an overview of ATOs, read An introduction to ATOs.

Why worry about controls?

Understanding the controls is an important part of the ATO process. Specifically when writing a system security and privacy plan. With hundreds of controls, approaching ATOs can be quite daunting. That's why it's good to start off with an overview of the controls.

The controls are grouped by topic, and those topics are called families. Next, we'll explore each control family and what kind of considerations that control family focuses on.

Meet the family

The three-column table below lists the 20 control families alphabetically by their two-character ID (identification code). Security and compliance folks often refer to the controls by this ID. For each, the ID is linked to the full list of controls for that family.

The second column provides the full name of the control family. The third column provides a plain language description of the control to give you a feel for what kind of security concern that control family covers.

IDControl familyPlain language description
ACAccess ControlHave policies that define who can access information and systems.
ATAwareness and TrainingTrain staff on IT safety practices, such as annual security training and phishing exercises.
AUAudit and AccountabilityMake sure you are creating and monitoring necessary logs and keeping records for the amount of time that they should be kept. You need policies to establish these practices and to produce evidence that you follow these actions.
CASecurity Assessment and AuthorizationThis describes most of the ATO process.
CMConfiguration ManagementThis includes policies and procedures of how software is approved and deployed. Defines who can make decisions and what policies or constraints prevent others from making unauthorized changes. Creating system inventory to document what you have and keeping that up to date.
CPContingency PlanningBeing able to recover if your system goes down or isn't working. You accomplish this by having the policies, technologies, testing, and training on how to recover from your system.
IAIdentification and AuthenticationHow you verify the identity of the users of your system and how your users log into your system.
IRIncident ResponseHave policies and procedures to respond to a cyber attack. Have people and tools to respond to data breaches and attacks.
MAMaintenanceWho is responsible for system maintenance. For example approving and monitoring security software, keeping packages up to date.
MPMedia ProtectionPolicies, procedures and tools to keep media secure. Media includes records of data, this could be a wide range of storage options, such as paper or electronic.
PSPersonnel SecurityPolicies and procedures about people's access to information and systems. Making sure people are cleared and trained to access information. People should lose system access when they leave.
PTPII Processing and TransparencyWhen you can collect PII and how you need to protect PII. This includes giving people a privacy notice and consent to collection.
PEPhysical and Environmental ProtectionThis includes things like locking doors and keeping buildings and access to servers secure.
PLPlanningPolicies and procedures about System Security Plans, Rules of engagement and other planning for your system.
PMProgram ManagementPolicies and procedures about managing your broader cyber security environment. This includes things like security and privacy training, data governance and management structures.
RARisk AssessmentDetermining how much risk your system presents. Evaluating what the implications are if your system went down, if data was exposed or if data was tampered with. Looking at the privacy risk of your system and looking for threats.
SASystem and Services AcquisitionCovers requirements for acquisition, software development and system management tools
SCSystem and Communications ProtectionAvailability protections against things like DDOS. Security features like Network boundaries, encryption and DNS protections.
SISystem and Information IntegrityMonitoring your system to look for data breaches.
SRSupply Chain Risk ManagementPreventing and looking for tampering of upstream components of your system.

You may have noticed that many of the controls require the efforts of your whole team. To get them onboard, it helps to describe the larger objectives of your policies and procedures. Taking the time to explain controls can help everyone better contribute to your system's security and compliance. View NIST's Cybersecurity and Privacy Reference Tool for more on control families.

Note

Web Managers Community

The Web Managers Community of Practice is a group of government employees and contractors who manage government websites and digital services. They work to create a trusted, seamless online experience for all. Join the Web Managers Community.