STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.

NIST 800-53 Controls

Rev 5Rev 4
Baselines:AllLowModerateHighPrivacyNo Baseline

Browse 800 security and privacy controls across 20 families. (filtered to Low, No Baseline, Privacy baselines)

Each control is linked to DISA CCI identifiers and STIG checks. Search for fast lookup by control ID or CCI.

Control FamiliesAll Controls800
AC Access Control97AT Awareness and Training14AU Audit and Accountability41CA Assessment, Authorization, and Monitoring19CM Configuration Management33CP Contingency Planning20IA Identification and Authentication52IR Incident Response30MA Maintenance20MP Media Protection14PE Physical and Environmental Protection36PL Planning11PM Program Management37PS Personnel Security16PT PII Processing and Transparency21RA Risk Assessment19SA System and Services Acquisition97SC System and Communications Protection119SI System and Information Integrity80SR Supply Chain Risk Management24

SC — System and Communications Protection

37 base controls

SC-1Policy and Procedures
25 CCIs
SC-5Denial-of-service Protection
6 CCIs
SC-6Resource Availability
4 CCIs
SC-7Boundary Protection
6 CCIs
SC-11Trusted Path
4 CCIs
SC-12Cryptographic Key Establishment and Management
17 CCIs
SC-13Cryptographic Protection
4 CCIs
SC-15Collaborative Computing Devices and Applications
3 CCIs
SC-16Transmission of Security and Privacy Attributes
6 CCIs
SC-20Secure Name/Address Resolution Service (Authoritative Source)
4 CCIs
SC-21Secure Name/Address Resolution Service (Recursive or Caching Resolver)
5 CCIs
SC-22Architecture and Provisioning for Name/Address Resolution Service
2 CCIs
SC-25Thin Nodes
2 CCIs
SC-26Honeypots
1 CCIs
SC-27Platform-Independent Applications
2 CCIs
SC-29Heterogeneity
2 CCIs
SC-30Concealment and Misdirection
5 CCIs
SC-31Covert Channel Analysis
3 CCIs
SC-32System Partitioning
4 CCIs
SC-34Non-Modifiable Executable Programs
4 CCIs
SC-35External Malicious Code Identification
1 CCIs
SC-36Distributed Processing and Storage
4 CCIs
SC-37Out-of-Band Channels
4 CCIs
SC-38Operations Security
2 CCIs
SC-39Process Isolation
1 CCIs
SC-40Wireless Link Protection
3 CCIs
SC-41Port and I/O Device Access
3 CCIs
SC-42Sensor Capability and Data
6 CCIs
SC-43Usage Restrictions
5 CCIs
SC-44Detonation Chambers
2 CCIs
SC-45System Time Synchronization
1 CCIs
SC-46Cross Domain Policy Enforcement
1 CCIs
SC-47Alternate Communications Paths
1 CCIs
SC-48Sensor Relocation
4 CCIs
SC-49Hardware-Enforced Separation and Policy Enforcement
2 CCIs
SC-50Software-Enforced Separation and Policy Enforcement
2 CCIs
SC-51Hardware-Based Protection
5 CCIs