Solved

NIST 800-53

Posted on 2014-12-11
2
180 Views
Last Modified: 2014-12-30
Hi,

Does anyone have a list of the low controls for revision 4:

http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf

Thanks

Jamie
0
Comment
Question by:Jack_son_
2 Comments
 
LVL 78

Expert Comment

by:David Johnson, CD, MVP
ID: 40495714
Are you referring to the low baseline?
0
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 40496028
The table D-2 on security control baseline already stated the "Low" for the initial control included. That should be the reference instead for the "low control". But do note that it need to be read together with the priority as those with P1 should be implemented first followed by P2 and lastly follow by P3.

if you are looking at some xls to sort that out, will then need to self do or google. Here is one though it stated for Federal Mobile security (xls), it did include the SP controls. However it did not seems to state the Priority and Level discussed. Probably has to add in or explore further
0

Featured Post

Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now