{"id":1928,"date":"2024-09-26T23:38:11","date_gmt":"2024-09-26T23:38:11","guid":{"rendered":"https:\/\/global.craft.co\/?p=1928"},"modified":"2024-09-26T23:38:11","modified_gmt":"2024-09-26T23:38:11","slug":"understanding-nist-800-53-revision-5","status":"publish","type":"post","link":"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/","title":{"rendered":"Understanding NIST 800-53 Revision 5"},"content":{"rendered":"<h2>A Guide for Government Agencies and their Information System Vendors<\/h2>\n<h2>What is NIST 800-53 Revision 5?<\/h2>\n<p><span style=\"font-weight: 400;\">NIST 800-53 Revision 5 is a set of guidelines published by the National Institute of Standards and Technology (NIST) aimed at helping organizations manage and protect their information systems.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Officially titled &#8220;Security and Privacy Controls for Information Systems and Organizations,&#8221; it provides a comprehensive framework of security and privacy controls to safeguard federal information systems and organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The standard includes a catalog of controls that organizations can use to protect their systems from various threats. The controls are organized into families and are designed to be applicable to a wide range of information systems, including those used by federal agencies and private sector organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h2>What are risk controls?<\/h2>\n<p><span style=\"font-weight: 400;\">Risk controls are measures or strategies to manage and mitigate risks that an organization faces. They are part of a broader risk management framework and are designed to reduce the likelihood or impact of potential threats to an organization\u2019s assets, operations, or objectives.<\/span><\/p>\n<p><b>There are four types of controls<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Preventive Controls<\/b><span style=\"font-weight: 400;\"> are designed to prevent risks from occurring. Examples include multi-factor authentication (MFA), security training for employees, firewalls, and access control measures.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Detective Controls<\/b><span style=\"font-weight: 400;\"> are intended to identify and detect risks that have already occurred or are in the process of occurring. Examples include risk monitoring and alerts, intrusion detection systems, audit logs, and regular security assessments.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Corrective Controls<\/b><span style=\"font-weight: 400;\"> focus on responses to and mitigation of the effects of risks that have already materialized. Examples include incident response plans, data recovery procedures, and patch management.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Compensating Controls<\/b><span style=\"font-weight: 400;\"> are used as alternative measures to address risks when primary controls cannot be implemented or are insufficient. They may not fully mitigate the risk but provide a level of protection or alternative approach.\u00a0<\/span><\/li>\n<\/ul>\n<h2>Why was Revision 5 created?<\/h2>\n<p><span style=\"font-weight: 400;\">NIST 800-53 Revision 5 is a critical resource for organizations aiming to build comprehensive security and privacy programs while meeting regulatory and contractual requirements. This revision was introduced to add new controls that reflect the evolving cybersecurity landscape, incorporating advancements in both technologies and emerging threats. Additionally, it places a stronger focus on privacy controls, acknowledging the growing importance of safeguarding personal data. Revision 5 also emphasizes the integration of security and privacy controls into an organization&#8217;s overall risk management framework, aligning with other standards and frameworks such as the NIST Cybersecurity Framework and ISO\/IEC 27001<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h2>Who must comply with NIST 800-53?<\/h2>\n<p><span style=\"font-weight: 400;\">The standard is primarily designed for U.S. federal agencies and their contractors but its influence extends broadly and has been adopted in a range of settings.\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Federal Agencies:<\/b><span style=\"font-weight: 400;\"> U.S. federal agencies are required to comply with the standard as part of their Federal Information Security Modernization Act (FISMA) compliance. FISMA mandates that federal agencies develop, document, and implement an information security and protection program.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Federal Contractors and Service Providers:<\/b><span style=\"font-weight: 400;\"> Organizations (including vendors,\u00a0 contractors, and subcontractors) that handle federal information or operate federal systems often need to comply to meet contractual obligations.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Organizations Handling Federal Data:<\/b><span style=\"font-weight: 400;\"> Private sector entities and non-profit organizations that manage federal data or systems may also be required to follow these guidelines, particularly if they are involved in federal projects or have agreements with federal agencies.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>State and Local Governments:<\/b><span style=\"font-weight: 400;\"> While not directly required, state and local government entities frequently adopt the standard to enhance their cybersecurity posture, especially if they handle federal data or receive federal funding.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Private Sector Organizations:<\/b><span style=\"font-weight: 400;\"> Many private sector organizations use the standard as a best practice framework to bolster their information security and privacy programs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>International Organizations:<\/b><span style=\"font-weight: 400;\"> Although not mandatory, international organizations use the standard as a reference for their own security and privacy frameworks, particularly if they work with U.S. federal agencies or seek to align with globally recognized standards.<\/span><\/li>\n<\/ul>\n<h2>Key requirements for compliance<\/h2>\n<p><span style=\"font-weight: 400;\">Compliance with NIST 800-53 R5 involves a number of key requirements and processes centered around the implementation and management of the security and privacy controls. <\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Summary of the key requirements<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Establish a Risk Management Framework (RMF)<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Organizations must establish and maintain a risk management framework that integrates risk assessment and risk mitigation strategies. This framework involves the continuous process of identifying, assessing, and managing risks related to information systems and data. By doing so, organizations can systematically address potential vulnerabilities and ensure that their systems are protected from evolving threats.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Implement Security and Privacy Controls<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Organizations need to select appropriate security and privacy controls from the NIST 800-53 Revision 5 control catalog. The selection should be based on the system&#8217;s categorization and risk assessment to ensure that the chosen controls match the specific needs and risks associated with the system. Once selected, these controls must be implemented effectively, which involves developing and deploying the necessary policies, procedures, and technical solutions to protect the information systems and data from unauthorized access or breaches.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Develop System Security and Privacy Plans<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Organizations must document the security controls in a System Security Plan (SSP). This plan provides a detailed description of how each control is implemented, the environment in which the system operates, and any constraints that may affect the system&#8217;s security. For systems that handle personal data, a Privacy Impact Assessment (PIA) should be developed, along with a System Privacy Plan (SPP) that outlines the specific privacy controls implemented to protect sensitive information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Conduct Security and Privacy Assessments<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Organizations must regularly assess and test the effectiveness of their implemented controls through security assessments and audits. These evaluations may include vulnerability assessments, penetration testing, and compliance reviews to identify any gaps in security or areas for improvement. Additionally, continuous monitoring practices should be established to detect changes in the threat landscape, system environment, or control effectiveness and to ensure that the system remains secure over time.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Perform Authorization and Accountability<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Organizations must obtain Authorization to Operate (ATO) for their systems, which is granted based on the risk management framework and an evaluation of the effectiveness of the controls in place. To support ongoing security and privacy efforts, roles and responsibilities must be clearly established for managing and overseeing the information security and privacy processes, ensuring that there is accountability for the proper implementation and maintenance of the controls.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Maintain Documentation and Reporting<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Organizations must maintain comprehensive and up-to-date documentation related to security and privacy controls. This includes detailed records of policies, procedures, assessment results, and any changes to the system or its environment. Additionally, organizations are responsible for reporting any security and privacy incidents or control deficiencies in accordance with both organizational and regulatory requirements, ensuring that proper corrective actions are taken when necessary.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Training and Awareness<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Organizations must develop and deliver training programs for all employees and contractors to ensure that they are knowledgeable about and adhere to security and privacy policies and procedures. To complement these training efforts, regular awareness campaigns should be conducted to keep personnel informed about emerging threats, security risks, and best practices in information security and privacy.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Review and Update<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Organizations must regularly review and update their security and privacy controls, policies, and procedures. This ensures that the controls remain effective and aligned with any changes in the organization&#8217;s risk environment or regulatory requirements. Continuous updates are necessary to adapt to new challenges in the cybersecurity landscape and maintain a strong security posture.<\/span><\/li>\n<li><b>Integrate with Other Frameworks<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Where applicable, organizations should align the implementation of NIST 800-53 controls with other frameworks and standards, such as the NIST Cybersecurity Framework or ISO\/IEC 27001. This alignment helps to ensure comprehensive coverage of security and privacy best practices while streamlining efforts across multiple regulatory and industry-specific frameworks.<\/span><\/li>\n<\/ul>\n<h2>How does NIST 800-53 R5 apply to suppliers and supply chain partners?<\/h2>\n<p><span style=\"font-weight: 400;\">NIST 800-53 R5 emphasizes the importance of managing cybersecurity risks not only within an organization but also across its supply chain. This recognition stems from the understanding that supply chain partners and suppliers can introduce significant risks to the security and privacy of information systems. Here\u2019s how NIST 800-53 R5 applies to suppliers and supply chain partners:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Incorporation of Supply Chain Risk Management (SCRM) Controls<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Control Families:<\/b><span style=\"font-weight: 400;\"> NIST 800-53 R5 includes specific controls related to supply chain risk management within the \u201cSupply Chain Protection\u201d control family. These controls focus on mitigating risks associated with the acquisition, use, and management of products and services from suppliers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Control Implementation:<\/b><span style=\"font-weight: 400;\"> Organizations are expected to implement controls that address risks associated with their supply chain. This includes evaluating and managing risks related to the supply chain processes, components, and services provided by third parties.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">2. Contractual and Security Requirements<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Contract Clauses:<\/b><span style=\"font-weight: 400;\"> When engaging with suppliers, organizations should include contractual clauses that require adherence to security and privacy controls consistent with NIST 800-53 R5. This may involve stipulating specific security requirements and the need for regular compliance reporting and audits.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Security Assessments:<\/b><span style=\"font-weight: 400;\"> Organizations may require suppliers to undergo security assessments or audits to ensure they meet the necessary security and privacy standards.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">3. Risk Assessment and Due Diligence<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Supplier Risk Assessment:<\/b><span style=\"font-weight: 400;\"> Organizations are required to conduct risk assessments for their supply chain partners to identify potential vulnerabilities and threats. This involves evaluating the security posture of suppliers and the risks they may pose to the organization\u2019s information systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Due Diligence:<\/b><span style=\"font-weight: 400;\"> Organizations should perform due diligence when selecting and managing suppliers, ensuring they have appropriate security controls and practices in place.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">4. Monitoring and Reporting<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">\u00a0Organizations should establish mechanisms for continuous monitoring of supply chain risks, including monitoring the security and privacy posture of suppliers. This helps in identifying and addressing any emerging threats or vulnerabilities. Suppliers should be required to report any security incidents or breaches that could impact the organization. Effective incident reporting mechanisms should be established to facilitate timely communication and response.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">5. Integration with Risk Management Framework<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Integrate supply chain risk management into the organization\u2019s overall Risk Management Framework (RMF). This involves incorporating supply chain risks into the organization\u2019s risk management processes and ensuring that supply chain risks are considered in the assessment and authorization of information systems.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">6. Documentation and Evidence<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Maintain thorough documentation of the security controls and risk management practices applied to supply chain partners. This documentation should include details about the selection process, security requirements, risk assessments, and ongoing monitoring activities.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">7. Training and Awareness<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Ensure that suppliers are aware of and understand the security requirements and controls expected of them. This may involve providing training or resources to help suppliers comply with the required standards.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">8. Incident Response and Recovery<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Develop and implement incident response and recovery plans that include provisions for handling incidents involving supply chain partners. This ensures a coordinated response to any security incidents affecting the supply chain.By integrating these practices, organizations can better manage supply chain risks and ensure that their partners and suppliers contribute to the overall security and privacy of the organization\u2019s information systems. NIST 800-53 R5 provides a structured approach for addressing these risks, helping organizations build more resilient and secure supply chains.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h2>How can Craft help?<\/h2>\n<p><a href=\"https:\/\/global.craft.co\/platform\/\"><span style=\"font-weight: 400;\">The Craft platform<\/span><\/a><span style=\"font-weight: 400;\"> enables robust supplier risk management capabilities and ensures compliance with supply chain due diligence and risk mitigation requirements. The Craft platform enhances your organizations risk management posture with the ability to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conduct supplier risk assessments with in-depth company profiles and easily scalable due diligence for selecting and managing suppliers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Continuously monitor your supplier network for events and changes in risk status<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identify supplier relationships and dependencies in the supply chain for key products, components, materials and services\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Share incident reports across teams and coordinate collaborative responses for faster risk mitigation<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integrate with other risk and governance technology platforms<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Document your efforts for proof of compliance<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A Guide for Government Agencies and their Information System Vendors What is NIST 800-53 Revision 5? NIST 800-53 Revision 5 is a set of guidelines published by the National Institute of Standards and Technology (NIST) aimed at helping organizations manage [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/pt-sidebar.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[57,56],"class_list":["post-1928","post","type-post","status-publish","format-standard","hentry","category-quick-guides","category-regulatory-compliance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3 (Yoast SEO v25.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding NIST 800-53 Revision 5 | Craft.co<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding NIST 800-53 Revision 5\" \/>\n<meta property=\"og:description\" content=\"A Guide for Government Agencies and their Information System Vendors What is NIST 800-53 Revision 5? NIST 800-53 Revision 5 is a set of guidelines published by the National Institute of Standards and Technology (NIST) aimed at helping organizations manage [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/\" \/>\n<meta property=\"og:site_name\" content=\"Craft.co\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/craftdotco\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-26T23:38:11+00:00\" \/>\n<meta name=\"author\" content=\"Jen McHam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@craftdotco\" \/>\n<meta name=\"twitter:site\" content=\"@craftdotco\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jen McHam\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/\"},\"author\":{\"name\":\"Jen McHam\",\"@id\":\"https:\/\/global.craft.co\/#\/schema\/person\/ea3a11be7bf2e6e4c89582f016aafbf6\"},\"headline\":\"Understanding NIST 800-53 Revision 5\",\"datePublished\":\"2024-09-26T23:38:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/\"},\"wordCount\":1923,\"publisher\":{\"@id\":\"https:\/\/global.craft.co\/#organization\"},\"articleSection\":[\"Quick Guides\",\"Regulatory &amp; Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/\",\"url\":\"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/\",\"name\":\"Understanding NIST 800-53 Revision 5 | Craft.co\",\"isPartOf\":{\"@id\":\"https:\/\/global.craft.co\/#website\"},\"datePublished\":\"2024-09-26T23:38:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/global.craft.co\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding NIST 800-53 Revision 5\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/global.craft.co\/#website\",\"url\":\"https:\/\/global.craft.co\/\",\"name\":\"Craft\",\"description\":\"Your path to supply chain resilience\",\"publisher\":{\"@id\":\"https:\/\/global.craft.co\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/global.craft.co\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/global.craft.co\/#organization\",\"name\":\"Craft\",\"url\":\"https:\/\/global.craft.co\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/global.craft.co\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/global.craft.co\/wp-content\/uploads\/2023\/12\/Craft_logo_positive_RGB.svg\",\"contentUrl\":\"https:\/\/global.craft.co\/wp-content\/uploads\/2023\/12\/Craft_logo_positive_RGB.svg\",\"caption\":\"Craft\"},\"image\":{\"@id\":\"https:\/\/global.craft.co\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/craftdotco\",\"https:\/\/x.com\/craftdotco\",\"https:\/\/www.linkedin.com\/company\/craft-machine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/global.craft.co\/#\/schema\/person\/ea3a11be7bf2e6e4c89582f016aafbf6\",\"name\":\"Jen McHam\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/global.craft.co\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fb877ff91f393d023051ec7ab5755677e9e4f9cd3d2722240ee0192972b72c02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fb877ff91f393d023051ec7ab5755677e9e4f9cd3d2722240ee0192972b72c02?s=96&d=mm&r=g\",\"caption\":\"Jen McHam\"},\"url\":\"https:\/\/global.craft.co\/blog\/author\/jenmcham\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding NIST 800-53 Revision 5 | Craft.co","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/","og_locale":"en_US","og_type":"article","og_title":"Understanding NIST 800-53 Revision 5","og_description":"A Guide for Government Agencies and their Information System Vendors What is NIST 800-53 Revision 5? NIST 800-53 Revision 5 is a set of guidelines published by the National Institute of Standards and Technology (NIST) aimed at helping organizations manage [&hellip;]","og_url":"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/","og_site_name":"Craft.co","article_publisher":"https:\/\/www.facebook.com\/craftdotco","article_published_time":"2024-09-26T23:38:11+00:00","author":"Jen McHam","twitter_card":"summary_large_image","twitter_creator":"@craftdotco","twitter_site":"@craftdotco","twitter_misc":{"Written by":"Jen McHam","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/#article","isPartOf":{"@id":"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/"},"author":{"name":"Jen McHam","@id":"https:\/\/global.craft.co\/#\/schema\/person\/ea3a11be7bf2e6e4c89582f016aafbf6"},"headline":"Understanding NIST 800-53 Revision 5","datePublished":"2024-09-26T23:38:11+00:00","mainEntityOfPage":{"@id":"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/"},"wordCount":1923,"publisher":{"@id":"https:\/\/global.craft.co\/#organization"},"articleSection":["Quick Guides","Regulatory &amp; Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/","url":"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/","name":"Understanding NIST 800-53 Revision 5 | Craft.co","isPartOf":{"@id":"https:\/\/global.craft.co\/#website"},"datePublished":"2024-09-26T23:38:11+00:00","breadcrumb":{"@id":"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/global.craft.co\/blog\/understanding-nist-800-53-revision-5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/global.craft.co\/"},{"@type":"ListItem","position":2,"name":"Understanding NIST 800-53 Revision 5"}]},{"@type":"WebSite","@id":"https:\/\/global.craft.co\/#website","url":"https:\/\/global.craft.co\/","name":"Craft","description":"Your path to supply chain resilience","publisher":{"@id":"https:\/\/global.craft.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/global.craft.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/global.craft.co\/#organization","name":"Craft","url":"https:\/\/global.craft.co\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/global.craft.co\/#\/schema\/logo\/image\/","url":"https:\/\/global.craft.co\/wp-content\/uploads\/2023\/12\/Craft_logo_positive_RGB.svg","contentUrl":"https:\/\/global.craft.co\/wp-content\/uploads\/2023\/12\/Craft_logo_positive_RGB.svg","caption":"Craft"},"image":{"@id":"https:\/\/global.craft.co\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/craftdotco","https:\/\/x.com\/craftdotco","https:\/\/www.linkedin.com\/company\/craft-machine\/"]},{"@type":"Person","@id":"https:\/\/global.craft.co\/#\/schema\/person\/ea3a11be7bf2e6e4c89582f016aafbf6","name":"Jen McHam","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/global.craft.co\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fb877ff91f393d023051ec7ab5755677e9e4f9cd3d2722240ee0192972b72c02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb877ff91f393d023051ec7ab5755677e9e4f9cd3d2722240ee0192972b72c02?s=96&d=mm&r=g","caption":"Jen McHam"},"url":"https:\/\/global.craft.co\/blog\/author\/jenmcham\/"}]}},"_links":{"self":[{"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/posts\/1928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/comments?post=1928"}],"version-history":[{"count":0,"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/posts\/1928\/revisions"}],"wp:attachment":[{"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/media?parent=1928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/categories?post=1928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}