Accessibility Tools

Skip to main content

Access World-Class NIST RMF Documentation with ASP Learn More

In NIST 800-53 Revision 5, the incident response control family focuses on establishing effective incident detection, response, and reporting capabilities within an organization. The controls in this family help organizations develop and implement incident response procedures, coordinate response activities, and minimize the impact of security incidents.

NIST Special Publication 800-53, Revision 5 (SP 800-53 Rev. 5), provides security and privacy controls for federal information systems and organizations. The identification and authentication (IA) control family focuses on establishing mechanisms to identify and authenticate users, devices, and entities accessing the system.

 NIST Special Publication 800-53, Revision 5 (SP 800-53 Rev. 5), provides security and privacy controls for federal information systems and organizations. Within SP 800-53 Rev. 5, the "CM" control family addresses the requirements related to Configuration Management. These controls focus on establishing processes and controls to manage the configuration of information systems and maintain their integrity and security.

NIST Special Publication 800-53, Revision 5 (SP 800-53 Rev. 5), provides security and privacy controls for federal information systems and organizations. Within SP 800-53 Rev. 5, the "CP" control family addresses the requirements related to Contingency Planning. These controls focus on establishing processes and procedures to ensure the availability and recoverability of information systems and data in the event of disruptions or disasters.

NIST Special Publication 800-53, Revision 5 (SP 800-53 Rev. 5), provides security and privacy controls for federal information systems and organizations. Within SP 800-53 Rev. 5, the "AU" control family addresses the requirements related to Audit and Accountability. These controls focus on establishing mechanisms for audit trail generation, review, analysis, and reporting to support the detection, investigation, and response to security incidents.

Version 2.2 (31 August 2020) of the Defense Counterintelligence and Security Agency Assessment and Authorization Process Manual (DAAPM) clearly state how “Federal agencies have adopted the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) as a common set of guidelines for the Assessment and Authorization (A&A) of Information Systems (IS).”

DoD & Cleared contractors in industry are required to perform, at a minimum, an annual risk assessment, and one that is specific to an actual ‘system’. While the DCSA DAAPM, and other related DoD documentation provides examples of a risk assessment (i.e., Risk Assessment Report – Appendix C of the DAAPM), they do not provide detailed information – and examples – of the threat sources. Developing and documenting such information can be time-consuming.

NIST Special Publication 800-53 provides guidelines and controls for securing federal information systems in the United States. One of the control families within NIST 800-53 is the "Awareness and Training" family (AT). The AT controls focus on establishing and implementing an effective security awareness and training program to educate personnel on their security roles and responsibilities.

Per DCSA, organizations must submit a CCP plan (CAGE Code-CCP-System Name) within eMASS.  A CCP plan will thus enable an organization to document their common controls, which will ensure consistency and streamline assessment and authorization processes.  The CCP package will be used to identify the common controls and all the associated procedures and artifacts, along with specifying if the common controls provide the required protection fully or in hybrid fashion.