Skip to main content
NIST SP 800-53 Revision 5 — Current Standard

NIST 800-53 R5
Compliance Documentation
That Actually Works

Battle-tested documentation templates and implementation guidance for the most comprehensive security and privacy control catalog used by federal agencies, DoD contractors and organizations worldwide. Best-in-class documentation structure provides the most comprehensive approach to being secure, compliant and resilient. Leverages the Secure Controls Framework (SCF) to scale compliance requirements beyond NIST SP 800-53 R5.

1,196
Security & Privacy Controls
20
Control Families
4
Baselines (Privacy / L / M / H)

Key Changes in NIST SP 800-53 R5

NIST SP 800-53 Revision 5, published in September 2020 with updates through 2025 (Rev 5.2.0), represents the most significant overhaul of the federal security control catalog. It moved from a compliance-oriented control set to an outcome-based, technology-neutral framework applicable to any type of information system.

The most impactful change was the integration of privacy controls directly into the main catalog — previously isolated in Appendix J. This gives privacy equal standing with security and eliminates the siloed approach from earlier versions.

Rev 5 also separated control baselines into a companion publication (SP 800-53B), allowing NIST to update baseline selections independently. The result is a more flexible, scalable catalog that serves federal agencies, cloud providers, DoD contractors and private sector organizations alike.

The 2025 update (Rev 5.2.0) added three new controls addressing secure software development in response to Executive Order 14028 — including logging syntax, root cause analysis for software updates, and design for cyber resiliency.

1

Privacy Controls Integrated

Privacy controls moved from Appendix J into the main catalog. New PT (PII Processing & Transparency) family added with dedicated privacy requirements.

→ New Family Added
2

Supply Chain Risk Management (SR)

New SR control family addresses third-party risk, component provenance and supply chain threat analysis — critical for Golden Dome and DIB contractors.

→ New Family Added
3

Outcome-Based & Technology-Neutral

Controls now focus on desired outcomes rather than specific technologies. Applicable to cloud, mobile, IoT, ICS and traditional IT environments.

→ Architectural Shift
4

Baselines Moved to SP 800-53B

Privacy, Low, Moderate and High baselines now maintained in a separate publication, allowing independent updates without revising the entire control catalog.

→ Structural Change
5

Rev 5.2.0 — Secure Software Controls

Three new controls added in 2025: Logging Syntax (SA-15), Root Cause Analysis (SI-02(07)) and Design for Cyber Resiliency (SA-24) per EO 14028.

→ 2025 Update

Four Security & Privacy
Control Baselines

NIST SP 800-53B defines four control baselines: a Privacy baseline that applies to all systems regardless of impact level, plus three security baselines (Low, Moderate, High) based on FIPS 199 system categorization.

96

Privacy Baseline

Applies to all systems regardless of impact level that process personally identifiable information (PII). Covers the PT family and privacy-related controls across other families.

149

Low Baseline

For systems where loss of confidentiality, integrity or availability would have limited adverse effect. Starting point for basic federal systems and low-risk environments.

287

Moderate Baseline

For systems where loss would have a serious adverse effect. The most widely implemented baseline — required for most federal systems, FedRAMP Moderate and many DoD environments.

370

High Baseline

For systems where loss would have severe or catastrophic adverse effect. Required for critical infrastructure, national security adjacent systems and Golden Dome for America programs.

What Documentation Does
NIST 800-53 R5 Require?

NIST SP 800-53 R5 compliance requires specific documentation artifacts aligned to the Risk Management Framework (RMF). ComplianceForge provides all required templates pre-mapped and ready to customize.

P

Policies & Standards (CDPP)

Documented security and privacy policies covering all 20 control families. Must address roles, responsibilities, frequency and organizational tailoring for your selected baseline.

O

Procedures (CSOP)

Standardized operating procedures that translate policies into actionable, step-by-step processes. Required to demonstrate how controls are actually implemented day-to-day.

S

System Security Plan (SSP)

The cornerstone document describing how each security requirement is implemented in your specific environment. Required by NIST RMF and FedRAMP authorization processes.

P

POA&M

Plan of Action & Milestones documenting deficiencies, planned remediation and target dates. Required to demonstrate active management of security gaps.

A

Assessment & Evidence

Security assessment reports, continuous monitoring strategy and technical evidence supporting each implemented control — configuration artifacts, scan results, training records.

S

SCRM Plan

Supply Chain Risk Management plan documenting how your organization identifies, assesses and mitigates risks from suppliers and third-party service providers per the SR family.

NIST 800-53 R5 Documentation
Solutions by Impact Level

ComplianceForge offers documentation bundles tailored to your NIST SP 800-53 R5 baseline — from individual policies and procedures to near-turnkey enterprise solutions.

High Baseline — Critical Systems

NIST 800-53 R5
High Solutions

High Baseline

The most rigorous baseline with 370 controls for systems where compromise could have severe or catastrophic consequences. Required for FedRAMP High, Golden Dome programs and critical national security systems.

  • Policies & Standards (CDPP) — High baseline mapped
  • Standardized Operating Procedures (CSOP) — High (includes FedRAMP High)
  • Combined Policies + Procedures bundle available
  • Near-Turnkey bundle with full SSP, POA&M & assessment tools
  • All 20 control families with enhanced control coverage
  • FedRAMP High alignment and GDA/Golden Dome readiness
  • Enterprise-grade SCRM and supply chain documentation
Ideal for: FedRAMP High CSPs, Golden Dome for America (GDA) contractors, critical infrastructure operators, and organizations with High-impact systems per FIPS 199.

Not sure which baseline? The Privacy baseline (96 controls) applies to all systems processing PII. For security baselines, most organizations handling federal data or pursuing FedRAMP authorization need Moderate. Choose High if your systems support critical infrastructure, national security programs like Golden Dome for America, or are categorized as High-impact per FIPS 199. Compare all solutions →

Golden Dome for America (GDA)
Requires NIST SP 800-53 R5

The Golden Dome for America (GDA) is a next-generation integrated missile defense system established by Executive Order 14186 in January 2025. The DoD has made clear that GDA vendors in the Defense Industrial Base (DIB) must implement robust cybersecurity controls to participate in this program.

Per the DoD memorandum, GDA contractors must implement NIST SP 800-53 R5 controls in accordance with DoDI 8510.01 (Risk Management Framework for DoD Systems). This means organizations operating or supporting GDA systems need documented policies, procedures and evidence aligned to 800-53 baselines.

Beyond 800-53, GDA contractors must achieve CMMC certification (minimum Level 2, Level 3 for APT-targeted components), implement SCRM per NIST SP 800-161 R1, harden systems to DoD STIGs, and maintain tamper protection programs for covered systems and components.

⚠  GDA Readiness: Organizations expecting GDA contract opportunities should begin implementing NIST SP 800-53 R5 controls now. The ComplianceForge Near-Turnkey High bundle provides the documentation foundation needed for DoDI 8510.01 compliance and GDA readiness.

GDA Cybersecurity Requirements
1

NIST SP 800-53 R5 Implementation

Implement controls in accordance with DoDI 8510.01 (Risk Management Framework for DoD Systems). Documentation must demonstrate control implementation at the appropriate baseline.

2

CMMC Certification

Minimum CMMC Level 2 for CUI handling. Level 3 (DIBCAC assessment) required for components targeted by Advanced Persistent Threats (APTs).

3

Supply Chain Risk Management (SCRM)

Adhere to NIST SP 800-161 R1. Maintain complete bill of materials (hardware, software, firmware, microelectronics) and mature ICT supply chain controls.

4

DoD STIG Hardening & Tamper Protection

Harden systems, applications and services per DoD STIGs. Implement a tamper protection program for covered systems and components.

5

Secure Software Development & EO 14028

Maintain a secure software development environment with attestation to Executive Order 14028 requirements for improving the nation’s cybersecurity.

GDA-ready documentation available:

Near-Turnkey High bundle — NIST 800-53 R5 High baseline with SCRM

Get High Bundle →

What Is NIST SP 800-53 R5?

NIST Special Publication 800-53 is the most comprehensive catalog of security and privacy controls for information systems and organizations. Published by NIST, Revision 5 (R5) contains 1,196 controls organized across 20 control families, covering technical, operational and management security requirements.

All U.S. federal information systems (except those designated as national security systems) are required to comply with NIST SP 800-53 under FISMA. Beyond federal agencies, 800-53 is the foundation for FedRAMP cloud authorizations, forms the basis of NIST SP 800-171 (for CUI protection), and is increasingly required by DoD programs like the Golden Dome for America.

Compliance requires documented policies, procedures, a System Security Plan (SSP), Plan of Action & Milestones (POA&M), and evidence that controls are implemented and operating effectively. ComplianceForge provides all required documentation templates pre-mapped to 800-53 R5 baselines.

1,196 security and privacy controls across 20 control families
Four control baselines: Privacy (96), Low (149), Moderate (287), High (370)
Mandatory for federal agencies under FISMA
Foundation for FedRAMP cloud authorization
Required by DoD under DoDI 8510.01 and Golden Dome for America
Source catalog for NIST SP 800-171 (CUI / CMMC)
Outcome-based and technology-neutral since Rev 5
Applicable Authorities & Frameworks
FISMA
FedRAMP
DoDI 8510.01
NIST RMF
FIPS 199 / 200
Golden Dome (GDA)
EO 14028
NIST CSF 2.0

800-53 vs 800-171: What’s the Difference?

NIST SP 800-53 is the comprehensive master catalog for federal information systems. NIST SP 800-171 is a derived subset for protecting CUI in nonfederal systems. Organizations operating federal systems implement 800-53 directly; nonfederal contractors handling CUI use 800-171. Both are built on the same control foundation.

FIPS 199 System Categorization

Before selecting a security baseline, organizations must categorize their systems per FIPS 199 based on the potential impact of a security breach. This determines whether Low, Moderate or High security baseline controls apply. The Privacy baseline applies to all systems processing PII, regardless of impact level. Incorrect categorization is one of the most common compliance failures.

Risk Management Framework (RMF)

NIST SP 800-53 controls are selected and implemented through the NIST Risk Management Framework (SP 800-37). RMF provides the structured process for categorizing systems, selecting controls, implementing, assessing, authorizing and monitoring — the complete authorization lifecycle.

The SCF Advantage:
One Framework, All Requirements

The Secure Controls Framework (SCF) is a free, open-source meta-framework that maps over 100 laws, regulations and standards into a single unified control set. It is the most comprehensive cybersecurity & data privacy control catalog available.

ComplianceForge builds all its documentation on the SCF backbone — meaning your NIST SP 800-53 R5 documentation is already pre-mapped to CMMC, ISO 27001, NIST CSF 2.0, SOC 2, HIPAA and dozens of other frameworks. Implement once, satisfy many.

The SCF also provides the Secure Controls Framework Conformity Assessment Program (SCF CAP) for third-party assessments and certifications — giving organizations a single path to multi-framework compliance validation.

🗺️

100+ Frameworks Pre-Mapped

NIST SP 800-53 R5, CMMC, ISO 27001, NIST CSF 2.0, SOC 2, HIPAA, FedRAMP, GDPR and more — all mapped in a single control framework.

⚙️

Baseline-Tailored Documentation

ComplianceForge documentation ships pre-mapped to 800-53 R5 Privacy, Low, Moderate and High baselines with control-by-control alignment for your selected impact level.

🔗

Supply Chain Risk Management

The SR control family is fully addressed with supply chain controls, third-party assessment templates and flow-down requirement guidance aligned to NIST SP 800-161 R1.

📈

Scalable From Agency to Enterprise

Whether you need individual policies and procedures or the full near-turnkey bundle, all ComplianceForge documentation is built on the same SCF foundation and scales with your program.

All 20 Control Families

NIST SP 800-53 Revision 5 organizes 1,196 security and privacy controls across 20 control families. Two families — PT (PII Processing & Transparency) and SR (Supply Chain Risk Management) — are new in Rev 5.

AC

Access Control

Limit system access to authorized users, processes and devices. Includes account management, least privilege, remote access and access enforcement.

AT

Awareness & Training

Ensure personnel are aware of security risks and trained on applicable policies, procedures and practices to carry out security responsibilities.

AU

Audit & Accountability

Create and retain audit logs for monitoring, analysis and investigation. Protect audit information and ensure accountability for system actions.

CA

Assessment, Authorization & Monitoring

Assess controls, authorize systems, monitor continuously and maintain plans of action for identified deficiencies.

CM

Configuration Management

Establish baseline configurations, control changes, track inventories and restrict unauthorized software and hardware.

CP

Contingency Planning

Prepare for disruptions and ensure continuity of operations. Includes backup, recovery, testing and alternate processing sites.

IA

Identification & Authentication

Identify and authenticate users, processes and devices before granting access. Includes MFA, password management and authenticator lifecycle.

IR

Incident Response

Establish incident handling capability covering preparation, detection, analysis, containment, recovery and reporting.

MA

Maintenance

Perform and control maintenance on organizational systems. Manage tools, techniques and personnel for maintenance activities.

MP

Media Protection

Protect system media (paper and digital). Limit access, sanitize or destroy media before disposal. Control transport of media.

PE

Physical & Environmental Protection

Limit physical access to authorized individuals. Protect and monitor facilities, provide emergency power and environmental controls.

PL

Planning

Develop and maintain system security and privacy plans. Define rules of behavior and address security architecture requirements.

PM

Program Management

Manage the organization-wide information security program. Includes risk strategy, authorization process and enterprise architecture.

PS

Personnel Security

Screen personnel, manage position risk categories, and protect information during transfers, terminations and personnel actions.

PT

PII Processing & Transparency New in R5

Requirements for processing personally identifiable information, consent, privacy notices, data quality and transparency.

RA

Risk Assessment

Assess risk to operations, assets and individuals. Scan for vulnerabilities and remediate findings. Includes supply chain risk.

SA

System & Services Acquisition

Allocate resources for security, employ SDLC practices, secure engineering principles and manage external service providers.

SC

System & Communications Protection

Monitor and protect communications at boundaries. Implement segmentation, cryptographic protections and protect data at rest and in transit.

SI

System & Information Integrity

Identify and correct flaws, protect against malicious code, monitor systems and ensure software and information integrity.

SR

Supply Chain Risk Management New in R5

Establish SCRM program, assess suppliers, manage component provenance and address supply chain threats.

What Makes ComplianceForge
Documentation Different

The documentation market is flooded with templates that look compliant but fail under actual assessment scrutiny. ComplianceForge documentation is built differently — engineered on the Secure Controls Framework (SCF), the most comprehensive cybersecurity control catalog available.

Every control narrative is written to align with NIST SP 800-53A R5 assessment objectives — meaning your documentation is specifically designed to satisfy what assessors actually test for, not just nominally reference the requirement.

The SCF cross-framework mapping means your NIST SP 800-53 documentation simultaneously satisfies CMMC, NIST CSF 2.0, ISO 27001, FedRAMP, HIPAA and other frameworks — reducing audit fatigue and supporting multi-framework compliance with one set of authoritative documentation.

ComplianceForge Principle

“Good documentation does not just describe what you do — it proves you understand why you do it and demonstrates it at scale. Every ComplianceForge template is written with the assessor’s questions in mind.”

🎯

Written for Assessors

Control narratives aligned to NIST SP 800-53A R5 assessment objectives — evidence-ready implementation statements, not generic descriptions.

🗂️

Complete Documentation Suite

Policies, standards, procedures, SSP, POA&M, controls catalog and evidence templates — all provided in a coherent, integrated package.

🔄

Multi-Framework by Design

SCF-based mapping means one documentation investment covers NIST 800-53, CMMC, ISO 27001, NIST CSF 2.0, FedRAMP and more simultaneously.

📐

Baseline-Specific Tailoring

Documentation ships pre-tailored to your selected baseline (Low, Moderate, High) with appropriate control coverage and organizational parameters.

🔒

Battle-Tested in Real Assessments

ComplianceForge documentation has been used in real FedRAMP, RMF and DIBCAC assessments. Proven effective under real scrutiny — not theoretical.

📦

Immediate Delivery, License to Customize

Delivered electronically and licensed for customization. Start your compliance program the same day without waiting for consultants.

NIST 800-53 R5 Across
Regulations & Standards

NIST SP 800-53 R5 is the most widely referenced security control catalog in the world. Understand how it connects to the broader compliance landscape.

🛡️

FISMA & Federal Agencies

The Federal Information Security Modernization Act requires all federal agencies to implement NIST SP 800-53 controls. 800-53 is the mandatory control catalog for federal information system authorization under the Risk Management Framework.

Mandatory for Federal
☁️

FedRAMP

The Federal Risk and Authorization Management Program requires cloud service providers to implement 800-53 controls at their designated impact level (Low, Moderate or High) to obtain an Authority to Operate (ATO).

Cloud Authorization
🏛️

DoDI 8510.01 & Golden Dome

DoD Instruction 8510.01 mandates the Risk Management Framework for DoD systems, requiring NIST SP 800-53 R5 implementation. The Golden Dome for America (GDA) program relies on this framework for DIB contractor cybersecurity.

DoD Systems
📑

NIST SP 800-171 & CMMC

NIST SP 800-171 derives its controls from 800-53, focusing on CUI protection in nonfederal systems. CMMC builds on both standards. Organizations using 800-53 have a strong foundation for 800-171 and CMMC compliance.

CUI & CMMC Foundation

Executive Order 14028

EO 14028 (Improving the Nation’s Cybersecurity) drove the Rev 5.2.0 update adding secure software development controls. Federal contractors and software suppliers must demonstrate compliance with these enhanced requirements.

Software Supply Chain
🌐

NIST CSF 2.0 & ISO 27001

NIST SP 800-53 R5 maps directly to NIST CSF 2.0 and ISO/IEC 27001:2022. SCF-based documentation bridges all three, enabling organizations to satisfy multiple standards simultaneously with one documentation set.

Framework Harmonization

Frequently Asked Questions

What is NIST SP 800-53 Revision 5?

NIST SP 800-53 R5 is the comprehensive catalog of security and privacy controls for information systems, published by NIST. It contains 1,196 controls across 20 families. Rev 5 made controls outcome-based and technology-neutral, integrated privacy controls, and added two new control families (PT and SR).

Who must comply with NIST 800-53?

All U.S. federal agencies under FISMA, DoD organizations under DoDI 8510.01, cloud providers seeking FedRAMP authorization, DoD contractors in the Defense Industrial Base supporting programs like Golden Dome for America, and any entity operating federal information systems.

What changed from Rev 4 to Rev 5?

Rev 5 integrated privacy controls into the main catalog, added PT and SR control families, moved baselines to SP 800-53B, made controls outcome-based and technology-neutral, and increased the catalog to 1,196 controls. The 2025 update (Rev 5.2.0) added three new secure software development controls.

What baseline do I need?

The Privacy baseline (96 controls) applies to all systems processing PII, regardless of impact level. Your security baseline depends on FIPS 199 system categorization: Low (149 controls) for limited-impact systems, Moderate (287 controls) for most federal systems and FedRAMP Moderate, and High (370 controls) for critical systems, FedRAMP High and Golden Dome programs.

How does 800-53 relate to Golden Dome for America?

GDA contractors must implement NIST SP 800-53 R5 controls per DoDI 8510.01. They also need CMMC certification (Level 2 minimum, Level 3 for APT-targeted components), SCRM per NIST SP 800-161 R1, DoD STIG hardening and EO 14028 attestation. Read full GDA requirements →

What is the difference between 800-53 and 800-171?

NIST SP 800-53 is the comprehensive master catalog of 1,196 controls for federal systems. NIST SP 800-171 is a derived subset for protecting CUI in nonfederal systems. Organizations operating federal systems use 800-53; nonfederal contractors handling CUI use 800-171.

What is the Secure Controls Framework (SCF)?

The SCF is a free, open-source meta-framework that harmonizes 100+ cybersecurity laws, regulations and standards into a single control set. ComplianceForge builds all documentation on the SCF, meaning 800-53 documentation simultaneously maps to CMMC, ISO 27001, NIST CSF 2.0 and more.

What documentation does ComplianceForge provide?

ComplianceForge offers policies & standards (CDPP), procedures (CSOP), combined policy+procedure bundles, and near-turnkey bundles that include SSP, POA&M, assessment guides and evidence templates — all pre-mapped to NIST SP 800-53 R5 at your selected baseline.

Get NIST 800-53 R5 Compliant —
The Right Way

ComplianceForge provides the only documentation built on the Secure Controls Framework — proven in real assessments, mapped to every major framework, and designed to satisfy NIST SP 800-53 R5 compliance at any baseline. Choose Moderate for most environments or High for critical systems and Golden Dome readiness.

20 Families
All Control Families Covered
100+ Maps
Frameworks Pre-Mapped
SCF-Powered
Best-in-Class Framework
GDA Ready
Golden Dome Aligned