STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.

NIST 800-53 Controls

Rev 5Rev 4

Browse 862 security and privacy controls across 26 families. (filtered to Low, Privacy, No Baseline baselines)

Each control is linked to DISA CCI identifiers and STIG checks. Search for fast lookup by control ID or CCI. Switch to Rev 5 for the latest controls.

Control FamiliesAll Controls862
AC Access Control112AP Authority and Purpose2AR Accountability, Audit, and Risk Management8AT Awareness and Training10AU Audit and Accountability58CA Assessment, Authorization, and Monitoring22CM Configuration Management50CP Contingency Planning48DI Data Quality and Integrity5DM Data Minimization and Retention6IA Identification and Authentication56IP Individual Participation and Redress6IR Incident Response34MA Maintenance26MP Media Protection22PE Physical and Environmental Protection50PL Planning10PM Program Management16PS Personnel Security15RA Risk Assessment13SA System and Services Acquisition86SC System and Communications Protection116SE Security2SI System and Information Integrity82TR Transparency5UL Use Limitation2

SC — System and Communications Protection

41 base controls

SC-1Policy and Procedures
25 CCIs
SC-2Application Partitioning
1 CCIs
SC-3Security Function Isolation
2 CCIs
SC-4Information in Shared Resources
1 CCIs
SC-5Denial of Service Protection
6 CCIs
SC-6Resource Availability
4 CCIs
SC-7Boundary Protection
6 CCIs
SC-8Transmission Confidentiality and Integrity
2 CCIs
SC-10Network Disconnect
2 CCIs
SC-11Trusted Path
4 CCIs
SC-12Cryptographic Key Establishment and Management
17 CCIs
SC-13Cryptographic Protection
4 CCIs
SC-15Collaborative Computing Devices
3 CCIs
SC-16Transmission of Security Attributes
6 CCIs
SC-17Public Key Infrastructure Certificates
3 CCIs
SC-18Mobile Code
6 CCIs
SC-19Voice over Internet Protocol
5 CCIs
SC-20Secure Name / Address Resolution Service (authoritative Source)
4 CCIs
SC-21Secure Name / Address Resolution Service (recursive or Caching Resolver)
5 CCIs
SC-22Architecture and Provisioning for Name / Address Resolution Service
2 CCIs
SC-23Session Authenticity
1 CCIs
SC-24Fail in Known State
5 CCIs
SC-25Thin Nodes
2 CCIs
SC-26Honeypots
1 CCIs
SC-27Platform-independent Applications
2 CCIs
SC-28Protection of Information at Rest
2 CCIs
SC-29Heterogeneity
2 CCIs
SC-30Concealment and Misdirection
5 CCIs
SC-31Covert Channel Analysis
3 CCIs
SC-32Information System Partitioning
4 CCIs
SC-34Non-modifiable Executable Programs
4 CCIs
SC-35Honeyclients
1 CCIs
SC-36Distributed Processing and Storage
4 CCIs
SC-37Out-of-band Channels
4 CCIs
SC-38Operations Security
2 CCIs
SC-39Process Isolation
1 CCIs
SC-40Wireless Link Protection
3 CCIs
SC-41Port and I/O Device Access
3 CCIs
SC-42Sensor Capability and Data
6 CCIs
SC-43Usage Restrictions
5 CCIs
SC-44Detonation Chambers
2 CCIs