NIST logo

Publication Citation: Recommended Security Controls for Federal Information Systems

NIST Authors in Bold

Author(s): Ronald S. Ross; Stuart W. Katzke; L A. Johnson; Marianne M. Swanson; G Stoneburner; G Rogers;
Title: Recommended Security Controls for Federal Information Systems
Published: December 19, 2006
Abstract: [Superseded by NIST SP 800-53, Revision 2 (December 2007): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51351] The purpose of this publication is to provide guidelines for selecting and specifying security controls for information systems supporting the executive agencies of the federal government. The guidelines have been developed to help achieve more secure information systems within the federal government by: (i) facilitating a more consistent, comparable, and repeatable approach for selecting and specifying security controls for information systems; (ii) providing a recommendation for minimum security controls for information systems in accordance with Federal Information Processing Standards (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems and FIPS 200, Minimum Security Requirements for Federal Information and Information Systems; (iii) promoting a dynamic, extensible catalog of security controls for information systems to meet the demands of changing requirements and technologies; and (iv) creating a foundation for the development of assessment methods and procedures for determining security control effectiveness. The guidelines provided in this special publication are applicable to all federal information systems other than those systems designated as national security systems as defined in 44 U.S.C., Section 3542. The guidelines have been broadly developed from a technical perspective to complement similar guidelines for national security systems. [Supersedes NIST SP 800-53 (Feb. 2005, with updates through June 71, 2005): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151305]
Citation: NIST SP - 800-53 Rev 1
Pages: 174 pp.
Keywords: accreditation; assurance requirements; common security controls; information technology; operational controls; organizational responsibilities; risk assessment; security controls; technical controls
Research Areas: Computer Security