NIST 800-53

Posted on 2014-12-11
Medium Priority
Last Modified: 2014-12-30

Does anyone have a list of the low controls for revision 4:



Question by:Jack_son_
LVL 85

Expert Comment

by:David Johnson, CD, MVP
ID: 40495714
Are you referring to the low baseline?
LVL 66

Accepted Solution

btan earned 2000 total points
ID: 40496028
The table D-2 on security control baseline already stated the "Low" for the initial control included. That should be the reference instead for the "low control". But do note that it need to be read together with the priority as those with P1 should be implemented first followed by P2 and lastly follow by P3.

if you are looking at some xls to sort that out, will then need to self do or google. Here is one though it stated for Federal Mobile security (xls), it did include the SP controls. However it did not seems to state the Priority and Level discussed. Probably has to add in or explore further

Featured Post

Get 10% Off Your First Squarespace Website

Ready to showcase your work, publish content or promote your business online? With Squarespace’s award-winning templates and 24/7 customer service, getting started is simple. Head to Squarespace.com and use offer code ‘EXPERTS’ to get 10% off your first purchase.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

There's never been a better time to become a computer scientist. Employment growth in the field is expected to reach 22% overall by 2020, and if you want to get in on the action, it’s a good idea to think about at least minoring in computer science …
Feeling responsible for an unfortunate ransomware infection on my parent's network, persistence paid off as I was able to decrypt a strain of ransomware that was not previously (or at least publicly) cracked. I hope this helps others out there affec…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question