NIST sp800 53-v4 Topology

NIST sp800 53-v4 Topology

SP 800-53 v4
Recommended Security Controls for Federal Information Systems
3 SECURITY CONTROL CLASSES
MANAGEMENT
55 Controls
OPERATIONAL
97 Controls
TECHNICAL
93 Controls
Program Management
16
Risk Assessment
5
Planning
6
Security Assessment
Authorization 8
System and Services
Acquisition 20
System and Communications
Protections 43
Identification and Authentication
11
Configuration Management
11
Awareness and Training
4
Audit and Accountability
16
Contingency Planning
12
Access Controls
23
Authored by; Jason P. Rusch - CISSP, CISM, CISA, CGEIT, GNSA | jason@infosec-rusch.com
Incident Response
11
Maintenance
6
Media Protection
8
Physical and Environmental
Protection 20
Personnel Security
8
System and Information Integrity
17
18 SECURITY CONTROL GROUPS
3 CONTROL PRIORITIES

Recommended

Information security - 360 Degree Approach by
Information security - 360 Degree ApproachInformation security - 360 Degree Approach
Information security - 360 Degree Approachharsh arora
325 views16 slides
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 by
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Tripwire
1.6K views38 slides
aPersona-HIPAA-HITECH-Compliance-v2 by
aPersona-HIPAA-HITECH-Compliance-v2aPersona-HIPAA-HITECH-Compliance-v2
aPersona-HIPAA-HITECH-Compliance-v2Chris Reese
69 views1 slide
SIEM in NIST Cyber Security Framework by
SIEM in NIST Cyber Security FrameworkSIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security FrameworkBernie Leung, P.E., CISSP
3.6K views16 slides
Top 10 Questions to Ask Your Vulnerability Management Provider by
Top 10 Questions to Ask Your Vulnerability Management ProviderTop 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management ProviderTawnia Beckwith
466 views4 slides
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS by
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSChristina33713
614 views13 slides

More Related Content

What's hot

LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) by
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)rver21
76 views8 slides
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan by
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanTripwire
2K views39 slides
Security Information and Event Management by
Security Information and Event ManagementSecurity Information and Event Management
Security Information and Event ManagementUTD Computer Security Group
352 views23 slides
Nist 800 53 deep dive 20210813 by
Nist 800 53 deep dive 20210813Nist 800 53 deep dive 20210813
Nist 800 53 deep dive 20210813Kinetic Potential
149 views13 slides
The Demystification of successful cybersecurity initiatives. by
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.FitCEO, Inc. (FCI)
354 views4 slides
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security by
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityTripwire
2.2K views9 slides

What's hot(20)

LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) by rver21
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
rver2176 views
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan by Tripwire
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
Tripwire2K views
The Demystification of successful cybersecurity initiatives. by FitCEO, Inc. (FCI)
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security by Tripwire
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
Tripwire2.2K views
"Backoff" Malware: How to Know If You're Infected by Tripwire
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
Tripwire2.5K views
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001 by ControlCase
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
ControlCase355 views
Achieving Effective IT Security with Continuous ISO 27001 Compliance by Tripwire
Achieving Effective IT Security with Continuous ISO 27001 ComplianceAchieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 Compliance
Tripwire3.2K views
Security information event management by Jhoni Guerrero
Security information event managementSecurity information event management
Security information event management
Jhoni Guerrero 42 views
QSA Shares PCI 3.0 Advice & Checklist by Tripwire
QSA Shares PCI 3.0 Advice & ChecklistQSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & Checklist
Tripwire2.4K views
PCI DSS Implementation: A Five Step Guide by AlienVault
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
AlienVault3.2K views
NIST cybersecurity framework by Shriya Rai
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
Shriya Rai990 views
Information Security Management by EC-Council
Information Security ManagementInformation Security Management
Information Security Management
EC-Council160 views
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC by Adam Levithan
Understanding Federal IT Compliance in Three Steps  - SharePoint Fest DCUnderstanding Federal IT Compliance in Three Steps  - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Adam Levithan114 views

More from Jason Rusch - CISSP CGEIT CISM CISA GNSA

Cobit v5 High Level Controls Topology by
Cobit v5 High Level Controls TopologyCobit v5 High Level Controls Topology
Cobit v5 High Level Controls TopologyJason Rusch - CISSP CGEIT CISM CISA GNSA
38 views1 slide
Cobit & ISO 27002 Governance Topology by
Cobit & ISO 27002 Governance TopologyCobit & ISO 27002 Governance Topology
Cobit & ISO 27002 Governance TopologyJason Rusch - CISSP CGEIT CISM CISA GNSA
95 views1 slide

More from Jason Rusch - CISSP CGEIT CISM CISA GNSA(20)

Recently uploaded

Plumbing by
PlumbingPlumbing
PlumbingIwiss Tools Co.,Ltd
15 views14 slides
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... by
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...Anowar Hossain
12 views34 slides
Digital Watermarking Of Audio Signals.pptx by
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxAyushJaiswal781174
8 views25 slides
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th... by
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...ahmedmesaiaoun
12 views84 slides
_MAKRIADI-FOTEINI_diploma thesis.pptx by
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptxfotinimakriadi
7 views32 slides
DevOps-ITverse-2023-IIT-DU.pptx by
DevOps-ITverse-2023-IIT-DU.pptxDevOps-ITverse-2023-IIT-DU.pptx
DevOps-ITverse-2023-IIT-DU.pptxAnowar Hossain
8 views45 slides

Recently uploaded(20)

DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... by Anowar Hossain
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain12 views
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th... by ahmedmesaiaoun
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
ahmedmesaiaoun12 views
_MAKRIADI-FOTEINI_diploma thesis.pptx by fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi7 views
Design and analysis of a new undergraduate Computer Engineering degree – a me... by WaelBadawy6
Design and analysis of a new undergraduate Computer Engineering degree – a me...Design and analysis of a new undergraduate Computer Engineering degree – a me...
Design and analysis of a new undergraduate Computer Engineering degree – a me...
WaelBadawy656 views
Informed search algorithms.pptx by Dr.Shweta
Informed search algorithms.pptxInformed search algorithms.pptx
Informed search algorithms.pptx
Dr.Shweta16 views
Design of machine elements-UNIT 3.pptx by gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy29 views
NEW SUPPLIERS SUPPLIES (copie).pdf by georgesradjou
NEW SUPPLIERS SUPPLIES (copie).pdfNEW SUPPLIERS SUPPLIES (copie).pdf
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou14 views
How I learned to stop worrying and love the dark silicon apocalypse.pdf by Tomasz Kowalczewski
How I learned to stop worrying and love the dark silicon apocalypse.pdfHow I learned to stop worrying and love the dark silicon apocalypse.pdf
How I learned to stop worrying and love the dark silicon apocalypse.pdf
fakenews_DBDA_Mar23.pptx by deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra812 views
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) by Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)

NIST sp800 53-v4 Topology

  • 1. SP 800-53 v4 Recommended Security Controls for Federal Information Systems 3 SECURITY CONTROL CLASSES MANAGEMENT 55 Controls OPERATIONAL 97 Controls TECHNICAL 93 Controls Program Management 16 Risk Assessment 5 Planning 6 Security Assessment Authorization 8 System and Services Acquisition 20 System and Communications Protections 43 Identification and Authentication 11 Configuration Management 11 Awareness and Training 4 Audit and Accountability 16 Contingency Planning 12 Access Controls 23 Authored by; Jason P. Rusch - CISSP, CISM, CISA, CGEIT, GNSA | jason@infosec-rusch.com Incident Response 11 Maintenance 6 Media Protection 8 Physical and Environmental Protection 20 Personnel Security 8 System and Information Integrity 17 18 SECURITY CONTROL GROUPS 3 CONTROL PRIORITIES