Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST SP 800-53

NIST SP 800-53

NIST SP 800-53 is a special publication by the National Institute of Standards and Technology; titled–Security and Privacy Controls for Information Systems and Organizations. It provides a comprehensive set of security and privacy controls organized into control families that support the development of safe and secure information systems.

Primarily developed for federal agencies, it can be used by any organization willing to strengthen its cybersecurity.

Controls catalog falls into three types:

  • Technical Controls: These include advanced solutions such as encryption and access controls.
  • Operational Controls: These focus on solving security issues relating to everyday operations, including physical security.
  • Management Controls: These highlight policies and procedures and governance initiatives.

NIST 800-53 also provides control baselines which are classified into categories that are low, moderate, and high class. Such baselines outline the potential impact security breaches could have on the information system so that organizations can decide what controls would be most applicable. The framework also gives supplemental guidance to assist the organization in implementing the controls effectively.

NIST 800-53 integrates with other NIST frameworks and is updated to keep organizations in pace with the changing technological and threat landscape. Revision 5 enhances a focus on privacy, expands control families, and generally makes it applicable to more orgs and use cases.

Additional reading

5 AI Compliance Companies You Must Know In 2025

AI’s potential is undeniable; we all agree on that. However, only 35% of customers are confident in its business use, and that’s a major red flag. This trust gap needs to be addressed, especially when compliance is on the line. So, how can businesses ensure that their compliance processes align with ethical AI practices? The…

12 Types of Network Security Measures

In the early days of the internet, Trojans were used to breach networks, and effective security solutions to prevent Trojans were developed. Today, trojans are a thing of the past. Bad actors now rely on phishing, spear phishing, and other social engineering-based attack vectors.  Network security measures for these vectors are now in shape; organizations…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.