Initial release NIST Special Publication 800-53 was initially released in February 2005 as "Recommended Security Controls for Federal Information Systems."
First revision NIST Special Publication 800-53 Revision 1 was initially released in December 2006 as "Recommended Security Controls for Federal Information Systems."
Second revision NIST Special Publication 800-53 Revision 2 was initially released in December 2007 as "Recommended Security Controls for Federal Information Systems."
Third revision The third version of NIST's Special Publication 800-53, "Recommended Security Controls for Federal Information Systems and Organizations," incorporates several recommendations from people who commented on previously published versions, who recommended a reduction in the number of security controls for low-impact systems, a new set of application-level controls and greater discretionary powers for organizations to downgrade controls. Also included in the final draft is language that allows federal agencies to keep their existing security measures if they can demonstrate that the level of security is equivalent to the standards being proposed by NIST. The third version also represents an effort to harmonize security requirements across government communities and between government and non-government systems. In the past, NIST guidance has not applied to government information systems identified as national security systems. The management, operational, and technical controls in SP 800-53 Revision 3 provide a common information security language for all government information systems. The revised security control catalog also includes state-of-the-practice safeguards and countermeasures to address advanced cyber threats and exploits. Significant changes in this revision of the document include • A simplified, six-step risk management framework; • Additional security controls and enhancements for advanced cyber threats; • Recommendations for prioritizing security controls during implementation or deployment; • Revised security control structure with a new references section; • Elimination of security requirements from supplemental guidance sections; • Guidance on using the risk management framework for legacy information systems and for external information system services providers; • Updates to security control baselines based on current threat information and cyber attacks; • Organization-level security controls for managing information security programs; • Guidance on the management of common controls within organizations; and • Strategy for harmonizing FISMA security standards and guidelines with international security standard
ISO/IEC 27001.
Fourth revision As part of the ongoing cyber security partnership among the
United States Department of Defense, the intelligence community, and the federal civil agencies, NIST has launched its biennial update to Special Publication 800‐53, "Security and Privacy Controls for Federal Information Systems and Organizations," with an initial public draft released on February 28, 2012. The 2011–12 initiative will include an update of current security controls, control enhancements, supplemental guidance and an update on tailoring and supplementation guidance that form key elements of the control selection process. Key focus areas include, but are not limited to: • Insider threats; • Software
application security (including web applications); • Social networking, mobiles devices, and
cloud computing; • Cross domain solutions; • Advanced persistent threats; •
Supply chain security; • Privacy. Revision 4 is broken up into 18 control families, including: • AC - Access Control • AU - Audit and Accountability • AT - Awareness and Training • CM - Configuration Management • CP - Contingency Planning • IA - Identification and Authentication • IR - Incident Response • MA - Maintenance • MP - Media Protection • PS - Personnel Security • PE - Physical and Environmental Protection • PL - Planning • PM - Program Management • RA - Risk Assessment • CA - Security Assessment and Authorization • SC - System and Communications Protection • SI - System and Information Integrity • SA - System and Services Acquisition Information on these control families and the controls contained within can be found on the NIST website at the following link: https://nvd.nist.gov/800-53/Rev4 Network Access Control (NAC) is a tool that was utilized to help reach NIST 800-53 standards, and used the Access Control resources to help authorize devices that wished to access the network. NAC also provided an easy and adaptable control to meet any organization security needs.
Fifth revision NIST SP 800-53 Revision 5 removes the word "federal" to indicate that these regulations may be applied to all organizations, not just federal organizations. The first public draft was published on August 15, 2017. A final draft release was set for publication in December 2018, with the final publication date set for March 2019." Per the NIST Computer Security Resource Center (CSRC), major changes to the publication include: • Making the security and privacy controls more outcome-based by changing the structure of the controls; • Fully integrating the privacy controls into the security control catalog creating a consolidated and unified set of controls for systems and organizations; • Separating the control selection process from the actual controls, thus allowing the controls to be used by different communities of interest including systems engineers, software developers, enterprise architects; and mission/business owners; • Eliminating the term "information system" and replacing it with the term "system" so the controls can be applied to any type of system including, for example, general-purpose systems, cyber-physical systems, industrial/process control systems, and IoT devices; • De-emphasizing the federal focus of the publication to encourage greater use by nonfederal organizations; • Promoting integration with different risk management and cyber security approaches and lexicons, including the Cybersecurity Framework; • Clarifying the relationship between security and privacy to improve the selection of controls necessary to address the full scope of security and privacy risks; and • Incorporating new, state of the practice controls based on threat intelligence and empirical attack data, including controls to strengthen cybersecurity and privacy governance and accountability. , Revision 5 was delayed due to a potential disagreement among the Office of Information and Regulatory Affairs (OIRA) and other U.S. agencies. The final version of Revision 5 was released on September 23, 2020 and is available on the NIST website at the following link: https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
Revision 5 Control Families The control families became a larger factor after Revision 5 and have the purpose of providing safeguards and protection for accomplishing security objectives. Every control is involved in a different policy and processes used by the systems security measures. After the upgrade to Revision 5 from Revision 4, the number of control families increased from 18 to 20 with the inclusion of Personally Identifiable Information Processing and Transparency (PT) and Supply Chain Risk Management (SR). NIST offers the power of controls to the government, but the ability to operate an ATO is required first. The usage of an ATO determines which controls are activated and utilized for the system automatically. Systems that involve greater risks to the framework, will be issued an increased number of controls to defend against outside threats. One term that is used for the controls is labeled as topics, or in other cases, Control Families. The development of Revision 5 allows the public and private sectors to use NIST in order to control major growing threats of hostile attacks and natural disasters, reducing as much damage from attacks the moment they occur.
Controls A main overview of the controls were to provide protective measures for the system and regulate risks that are taken and the solutions in order to comply with different standards. The main goal of the system is to protect the information of different users and encourages companies to take different measures in improving the security and protection of the frameworks within the supervision of Revision 5. Controls are not expected to be sustained over time, but the process of withdrawing controls from different revisions will be utilized and replaced with existing or new controls in order to replicate its place in the system. Controls are expected to take its place until they are pronounced as not necessary, or ineffective to the current state. Revision 5 built SP 800-53 to a new height after the past seven years since the last major update to NIST's security guidelines. Further enhanced to comply with the security interests of the United States and the millions of downloads it has procured since 2013. Revision 5 was tested in a scenario that involved 42 different risks in order to test the reliability of the frame work and success of the new revision. Out of the 42 different scenarios, 12 were accepted and 30 different scenarios were mitigated by the system. == 800-53A ==