Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST SP 800-53

NIST SP 800-53

NIST SP 800-53 is a special publication by the National Institute of Standards and Technology; titled–Security and Privacy Controls for Information Systems and Organizations. It provides a comprehensive set of security and privacy controls organized into control families that support the development of safe and secure information systems.

Primarily developed for federal agencies, it can be used by any organization willing to strengthen its cybersecurity.

Controls catalog falls into three types:

  • Technical Controls: These include advanced solutions such as encryption and access controls.
  • Operational Controls: These focus on solving security issues relating to everyday operations, including physical security.
  • Management Controls: These highlight policies and procedures and governance initiatives.

NIST 800-53 also provides control baselines which are classified into categories that are low, moderate, and high class. Such baselines outline the potential impact security breaches could have on the information system so that organizations can decide what controls would be most applicable. The framework also gives supplemental guidance to assist the organization in implementing the controls effectively.

NIST 800-53 integrates with other NIST frameworks and is updated to keep organizations in pace with the changing technological and threat landscape. Revision 5 enhances a focus on privacy, expands control families, and generally makes it applicable to more orgs and use cases.

Additional reading

How to Create a Cybersecurity Disaster Recovery Plan

Your company’s digital infrastructure has the potential to crumble in the blink of an eye. Leaders might know this but don’t want to face it. With disasters, it’s almost always the question of “when” not and “if”.  While digital interconnectedness propels us forward with unprecedented efficiency, it also exposes us to vulnerabilities that tend to…

How to Create Cybersecurity Dashboard

Data does not always guarantee visibility. More often than not, CISOs find themselves entangled in a maze of tools offering siloed views of security and performance. And with such skewed views, organizations are often susceptible to blind spots that can be extremely hard to trace and resolve.  With a lack of insightful and actionable data,…

ISO 27001 Malware and Antivirus Policy: Your SMB’s Frontline Defense

Malware protection is a core requirement for ISO 27001 compliance, but many security and compliance teams underestimate the depth of what’s needed. It’s easy to install antivirus software across endpoints. What’s harder is proving that protection is consistently active, up to date, monitored, and backed by evidence that auditors will accept. For SMBs with lean…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.