Understanding NIST Security Controls: A Comprehensive Guide

NIST stands for the National Institute of Standards and Technology, which is a non-regulatory agency of the United States Department of Commerce. NIST is responsible for developing and maintaining a variety of technical standards and guidelines, including those related to information technology and cybersecurity.

In the context of Azure cloud, NIST has provided a framework for cloud computing that defines a set of standards and best practices for organizations to follow when implementing cloud-based solutions. This framework, known as the NIST Cloud Computing Reference Architecture, provides guidance on how to design, deploy, and manage cloud services and infrastructure.

Azure cloud has been designed to comply with the NIST standards and guidelines, which means that it follows the best practices and recommendations set forth by NIST. This ensures that Azure cloud services and infrastructure are secure, reliable, and consistent with industry standards.

In summary, NIST provides a framework for cloud computing that Azure follows to ensure that its cloud services and infrastructure are secure, reliable, and meet industry standards.

There are a total of 110 security controls in the NIST Special Publication 800-53, which is a comprehensive guide to security and privacy controls for federal information systems and organizations. The controls are organized into 20 families, as follows:

  1. Access Control
  2. Awareness and Training
  3. Audit and Accountability
  4. Security Assessment and Authorization
  5. Configuration Management
  6. Contingency Planning
  7. Identification and Authentication
  8. Incident Response
  9. Maintenance
  10. Media Protection
  11. Physical and Environmental Protection
  12. Planning
  13. Personnel Security
  14. Risk Assessment
  15. System and Services Acquisition
  16. System and Communications Protection
  17. System and Information Integrity
  18. Program Management
  19. Privacy Controls
  20. Supply Chain Risk Management

Each family contains a set of controls that are designed to address specific security objectives and requirements. For example, the Access Control family includes controls related to user identification and authentication, access permissions, and separation of duties, while the Incident Response family includes controls related to incident detection, reporting, and response.

It’s worth noting that the NIST security controls are not intended to be a one-size-fits-all solution, and organizations may need to tailor their security strategies and controls to meet their specific needs and requirements.

Here are all the 110 security controls from NIST Special Publication 800-53 with a brief explanation of each:

Access Control:

  • AC-1 Access Control Policy and Procedures: Develop and implement access control policies and procedures.
  • AC-2 Account Management: Limit account access to authorized users and enforce password complexity requirements.
  • AC-3 Access Enforcement: Control access to information resources based on policies and procedures.
  • AC-4 Information Flow Enforcement: Enforce information flow policies and procedures.
  • AC-5 Separation of Duties: Separate duties to ensure that one individual does not control all aspects of a process.
  • AC-6 Least Privilege: Limit access to only those privileges necessary to perform authorized tasks.
  • AC-7 Unsuccessful Login Attempts: Track and alert on unsuccessful login attempts.
  • AC-8 System Use Notification: Display an approved-use banner before granting access.
  • AC-9 Previous Logon Notification: Notify users of previous successful and unsuccessful login attempts.
  • AC-10 Concurrent Session Control: Control and manage concurrent sessions for users.
  • AC-11 Session Lock: Automatically lock user sessions after a period of inactivity.
  • AC-12 Session Termination: Automatically terminate user sessions after a defined period of inactivity.
  • AC-14 Permitted Actions without Identification or Authentication: Specify permitted actions that can be performed without identification or authentication.

Awareness and Training:

  • AT-1 Security Awareness and Training Policy and Procedures: Develop and implement a security awareness and training program.
  • AT-2 Security Training for Personnel: Provide security training to personnel commensurate with their responsibilities.
  • AT-3 Role-Based Security Training: Provide role-based security training to personnel.
  • AT-4 Security Training Records: Maintain records of security training.

Audit and Accountability:

  • AU-1 Audit and Accountability Policy and Procedures: Develop and implement an audit and accountability policy.
  • AU-2 Audit Events: Generate audit events for selected events and store them centrally.
  • AU-3 Content of Audit Records: Include required content in audit records.
  • AU-4 Audit Storage Capacity: Provide sufficient audit storage capacity.
  • AU-5 Response to Audit Processing Failures: Protect the availability and integrity of audit records in the event of processing failures.
  • AU-6 Audit Review, Analysis, and Reporting: Review, analyze, and report on audit records.
  • AU-7 Audit Reduction and Report Generation: Reduce audit records to a manageable level and generate reports.
  • AU-8 Time Stamps: Generate time stamps for audit records.
  • AU-9 Protection of Audit Information: Protect audit records and audit reduction tools from unauthorized access, modification, and deletion.
  • AU-10 Non-repudiation: Provide non-repudiation and proof of origin for audit records.

Security Assessment and Authorization:

  • RA-1 Risk Assessment Policy and Procedures: Develop and implement risk assessment policies and procedures.
  • RA-2 Security Categorization: Categorize information and information systems based on risk.
  • RA-3 Risk Assessment: Conduct risk assessments and document results.
  • RA-4 Risk Assessment Update: Update risk assessments on a regular basis or as needed.
  • RA-5 Vulnerability Scanning: Conduct vulnerability scanning to identify and remediate vulnerabilities.
  • RA-6 Technical Vulnerability Remediation: Remediate identified vulnerabilities in a timely manner.
  • RA-7 System and Services Acquisition: Include security requirements in system and service acquisition processes.
  • RA-8 Security Engineering Principles: Apply security engineering principles during system and service design.
  • RA-9 Risk Management Strategy: Develop and implement a risk management strategy.
  • RA-10 Security Authorization: Authorize systems and services for processing based on risk.

Configuration Management:

  • CM-1 Configuration Management Policy and Procedures: Develop and implement configuration management policies and procedures.
  • CM-2 Baseline Configuration: Establish and maintain a baseline configuration of information systems.
  • CM-3 Configuration Change Control: Control changes to the configuration of information systems.
  • CM-4 Security Impact Analysis: Conduct a security impact analysis before changes to the configuration of information systems are implemented.
  • CM-5 Access Restrictions for Change: Restrict access to the configuration of information systems to authorized personnel.
  • CM-6 Configuration Settings: Establish and enforce security configuration settings for information systems.
  • CM-7 Least Functionality: Establish and enforce least functionality for information systems.
  • CM-8 Information System Component Inventory: Develop and maintain an inventory of information system components.
  • CM-9 Configuration Management Plan: Develop and implement a configuration management plan.

Contingency Planning:

  • CP-1 Contingency Planning Policy and Procedures: Develop and implement contingency planning policies and procedures.
  • CP-2 Contingency Plan: Develop and implement a contingency plan for information systems.
  • CP-3 Contingency Training: Provide contingency training to personnel.
  • CP-4 Contingency Plan Testing: Test contingency plans on a regular basis.
  • CP-5 Contingency Plan Update: Update contingency plans on a regular basis or as needed.
  • CP-6 Alternate Storage Site: Establish and maintain alternate storage sites for essential information systems and data.
  • CP-7 Alternate Processing Site: Establish and maintain alternate processing sites for essential information systems.
  • CP-8 Telecommunications Services: Establish and maintain telecommunications services to support contingency operations.
  • CP-9 Information System Backup: Backup information system data and software.
  • CP-10 Information System Recovery and Reconstitution: Recover information system data and software.

Identification and Authentication:

  • IA-1 Identification and Authentication Policy and Procedures: Develop and implement identification and authentication policies and procedures.
  • IA-2 Identification and Authentication (Organizational Users): Identify and authenticate organizational users (or processes acting on behalf of organizational users) before granting access.
  • IA-3 Device Identification and Authentication: Identify and authenticate devices before allowing access to the network.
  • IA-4 Identifier Management: Manage user and device identifiers.
  • IA-5 Authenticator Management: Manage authenticators.
  • IA-6 Authenticator Feedback: Provide feedback to users and devices regarding authentication.
  • IA-7 Cryptographic Module Authentication: Authenticate cryptographic modules before using them.
  • IA-8 Identification and Authentication for External Systems: Identify and authenticate external systems before establishing connections.
  • IA-9 Authenticator Feedback: Provide feedback to external systems regarding authentication.
  • IA-10 Remote Access: Manage remote access to information systems.

Incident Response:

  • IR-1 Incident Response Policy and Procedures: Develop and implement incident response policies and procedures.
  • IR-2 Incident Response Training: Provide incident response training to personnel.
  • IR-3 Incident Response Testing: Test incident response capabilities on a regular basis.
  • IR-4 Incident Handling: Establish and operate an incident handling capability.
  • IR-5 Incident Monitoring: Monitor information systems for indications of potential incidents.
  • IR-6 Incident Reporting: Report incidents to appropriate authorities.
  • IR-7 Incident Response Assistance: Provide incident response assistance to external stakeholders.
  • IR-8 Incident Response Plan: Develop and implement incident response plans.

Maintenance:

  • MA-1 System Maintenance Policy and Procedures: Develop and implement system maintenance policies and procedures.
  • MA-2 Controlled Maintenance: Control maintenance activities on information systems.
  • MA-3 Maintenance Tools: Use only authorized maintenance tools.
  • MA-4 Nonlocal Maintenance: Authorize nonlocal maintenance on information systems.
  • MA-5 Maintenance Personnel: Screen maintenance personnel prior to authorizing access to information systems.
  • MA-6 Timely Maintenance: Perform maintenance in a timely manner to minimize the impact on information systems.
  • MA-7 Remote Maintenance: Authorize remote maintenance on information systems.
  • MA-8 Unscheduled Maintenance: Control unscheduled maintenance on information systems.
  • MA-9 System and Information Integrity Updates: Update and maintain the integrity of system and information integrity software.

Media Protection:

  • MP-1 Media Protection Policy and Procedures: Develop and implement media protection policies and procedures.
  • MP-2 Media Access: Control access to media containing information.
  • MP-3 Media Labeling: Label media containing information.
  • MP-4 Media Storage: Store media containing information in controlled areas.
  • MP-5 Media Transport: Transport media containing information in a secure manner.
  • MP-6 Media Sanitization: Sanitize media containing information prior to disposal or reuse.
  • MP-7 Media Disposal: Dispose of media containing information in a secure manner.

Personnel Security:

  • PS-1 Personnel Security Policy and Procedures: Develop and implement personnel security policies and procedures.
  • PS-2 Position Categorization: Categorize positions based on risk to the organization.
  • PS-3 Personnel Screening: Screen personnel prior to authorizing access to information systems.
  • PS-4 Personnel Termination: Terminate personnel access to information systems upon termination of employment or contract.
  • PS-5 Personnel Transfer: Transfer personnel access to information systems in a secure manner.
  • PS-6 Access Agreements: Require personnel to sign access agreements prior to being granted access to information systems.

Physical and Environmental Protection:

  • PE-1 Physical and Environmental Protection Policy and Procedures: Develop and implement physical and environmental protection policies and procedures.
  • PE-2 Physical Access Authorization: Authorize physical access to information systems and facilities.
  • PE-3 Physical Access Control: Control physical access to information systems and facilities.
  • PE-4 Access Log: Maintain an access log of individuals who have accessed information systems and facilities.
  • PE-5 Visitor Control: Control access of visitors to information systems and facilities.
  • PE-6 Access Records: Maintain records of access to information systems and facilities.
  • PE-7 Visitor Access Records: Maintain records of access by visitors to information systems and facilities.
  • PE-8 Access Control for Transmission Medium: Control access to transmission media.
  • PE-9 Power Equipment and Power Cabling: Control power equipment and power cabling for information systems and facilities.
  • PE-10 Emergency Shutoff: Install emergency shutoff mechanisms for power equipment.

Planning:

  • PL-1 Security Planning Policy and Procedures: Develop and implement security planning policies and procedures.
  • PL-2 System Security Plan: Develop and maintain a system security plan for information systems.
  • PL-3 Security Requirements: Develop and maintain security requirements for information systems.
  • PL-4 Rules of Behavior: Develop and maintain rules of behavior for personnel accessing information systems.
  • PL-5 Privacy Impact Assessment: Conduct a privacy impact assessment for information systems.
  • PL-6 Security Impact Analysis: Conduct a security impact analysis for information systems.
  • PL-7 Security Certification: Certify information systems are in compliance with security requirements.
  • PL-8 Security Accreditation: Accreditate information systems are in compliance with security requirements.

Risk Assessment:

  • RA-1 Risk Assessment Policy and Procedures: Develop and implement risk assessment policies and procedures.
  • RA-2 Security Categorization: Categorize information systems based on risk to the organization.
  • RA-3 Risk Assessment: Conduct a risk assessment for information systems.
  • RA-4 Risk Mitigation: Mitigate risks to information systems.
  • RA-5 Vulnerability Scanning: Conduct vulnerability scanning on information systems.
  • RA-6 Penetration Testing: Conduct penetration testing on information systems.

System and Services Acquisition:

  • SA-1 System and Services Acquisition Policy and Procedures: Develop and implement system and services acquisition policies and procedures
  • SA-2 Allocation of Resources: Allocate resources for system and services acquisition.
  • SA-3 Life Cycle Processes: Implement life cycle processes for system and services acquisition.
  • SA-4 Acquisition Process: Establish an acquisition process for information systems and services.
  • SA-5 Information System Documentation: Develop and maintain documentation for information systems and services.
  • SA-6 Software Usage Restrictions: Restrict software usage for information systems and services.
  • SA-7 User Installed Software: Control user installed software on information systems.
  • SA-8 Security Engineering Principles: Apply security engineering principles to information systems and services.
  • SA-9 External Systems: Manage risks from external systems when acquiring information systems.
  • SA-10 Developer Configuration Management: Manage configuration changes by developers to information systems and services.
  • SA-11 Developer Security Testing: Test the security of information systems and services prior to deployment.
  • SA-12 Supply Chain Protection: Protect information system and service supply chains.
  • SA-13 Trustworthiness: Assess the trustworthiness of information systems and services.

System and Communications Protection:

  • SC-1 System and Communications Protection Policy and Procedures: Develop and implement system and communications protection policies and procedures.
  • SC-2 Application Partitioning: Separate applications on information systems to minimize damage from a security compromise.
  • SC-3 Security Function Isolation: Isolate security functions on information systems.
  • SC-4 Information in Shared Resources: Protect information in shared resources.
  • SC-5 Denial of Service Protection: Protect information systems from denial of service attacks.
  • SC-6 Resource Priority: Allocate resources based on priority.
  • SC-7 Boundary Protection: Protect the boundary of information systems.
  • SC-8 Transmission Integrity: Protect the integrity of information during transmission.
  • SC-9 Transmission Confidentiality: Protect the confidentiality of information during transmission.
  • SC-10 Network Disconnect: Disconnect information systems from networks when no longer needed.
  • SC-11 Trusted Path: Use trusted paths for sensitive transactions.
  • SC-12 Cryptographic Key Establishment and Management: Establish and manage cryptographic keys.
  • SC-13 Use of Cryptography: Use cryptography to protect information.

System and Information Integrity:

  • SI-1 System and Information Integrity Policy and Procedures: Develop and implement system and information integrity policies and procedures.
  • SI-2 Flaw Remediation: Remediate identified flaws in information systems.
  • SI-3 Malicious Code Protection: Protect information systems from malicious code.
  • SI-4 Information System Monitoring: Monitor information systems for unauthorized activity.
  • SI-5 Security Alerts, Advisories, and Directives: Receive and implement security alerts, advisories, and directives.
  • SI-6 Security Functionality Verification: Verify the correct operation of security functions.
  • SI-7 Software and Information Integrity: Ensure the integrity of software and information.
  • SI-8 Spam and Spyware Protection: Protect information systems from spam and spyware.
  • SI-9 Information Input Restrictions: Restrict information input to authorized sources and methods.
  • SI-10 Information Output Handling and Retention: Handle and retain information output in a secure manner.
  • SI-11 Error Handling: Handle errors in a secure manner.

Program Management:

  • PM-1 Program Management Plan: Develop and maintain a program management plan.
  • PM-2 System Development Life Cycle: Incorporate security into the system development life cycle.
  • PM-3 Information Security Strategy: Develop and maintain an information security strategy.
  • PM-4 Resource Allocation: Allocate resources to support the information security program.
  • PM-5 Program Management Accountability: Establish program management accountability.
  • PM-6 Program Coordination: Coordinate and collaborate with external organizations.
  • PM-7 Program Monitoring and Evaluation: Monitor and evaluate the effectiveness of the information security program.
  • PM-8 Communications: Communicate information security information to stakeholders.

Privacy Controls:

  • PR-1 Privacy Policy and Procedures: Develop and implement privacy policies and procedures.
  • PR-2 Privacy Impact Assessment: Conduct privacy impact assessments for information systems.
  • PR-3 Privacy Training: Provide privacy training for personnel.
  • PR-4 Privacy Notice: Provide a privacy notice to individuals.
  • PR-5 Privacy Breach Response Planning: Develop and implement a privacy breach response plan.
  • PR-6 Anonymous Access: Provide anonymous access to publicly accessible information systems.
  • PR-7 Privacy Configuration: Configure information systems to protect privacy.
  • PR-8 Privacy Accountability: Establish privacy accountability.

Supply Chain Risk Management:

  • SCRM-1 Supply Chain Risk Management Policy and Procedures: Develop and implement supply chain risk management policies and procedures.
  • SCRM-2 Supply Chain Risk Management Plan: Develop and maintain a supply chain risk management plan.
  • SCRM-3 Supply Chain Criticality Assessment: Assess the criticality of information system components in the supply chain.
  • SCRM-4 Supply Chain Component Inventory: Maintain an inventory of information system components in the supply chain.
  • SCRM-5 Trusted Sources: Establish trusted sources for information system components.
  • SCRM-6 Supplier Risk Assessment: Assess supplier security risks.
  • SCRM-7 Supply Chain Traceability and Authenticity: Verify the authenticity of information system components in the supply chain.
  • SCRM-8 Supply Chain Cybersecurity Requirements: Include cybersecurity requirements in supply chain contracts.
  • SCRM-9 Trusted Delivery: Ensure the secure delivery of information system components in the supply chain.

These 110 security controls are designed to ensure the confidentiality, integrity, and availability of information and information systems. They cover a wide range of security areas, including access control, security assessment and authorization, identification and authentication, audit and accountability, risk assessment, system and information integrity, and more. By implementing these controls, organizations can better protect themselves against security threats and ensure the security of their information and systems.