Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family AC

AC-11Device Lock

Prevent further access to the system by {{ insert: param, ac-11_odp.01 }} ; and Retain the device lock until the user reestablishes access using established identification and authentication procedures.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (2)

Weaknesses this control addresses (3)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,832Device lock enforces restricted access until re-authentication, directly reducing unauthorized use of active sessions.
CWE-306Missing Authentication for Critical Function2,567Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.
CWE-613Insufficient Session Expiration606Locks the device (typically after inactivity) until re-authentication, addressing insufficient session expiration by preventing indefinite access.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2024-442861.57.50.0009good
CVE-2025-486051.78.40.0000good
CVE-2025-486021.78.40.0000good
CVE-2024-538351.67.80.0001partial
CVE-2024-437641.67.80.0001partial
CVE-2024-441360.94.60.0030good
CVE-2025-155541.67.80.0002good
CVE-2024-579571.36.60.0010good

Other controls in family AC

AC-1 AC-10 AC-12 AC-13 AC-14 AC-15 AC-16 AC-17 AC-18 AC-19 AC-2 AC-20 AC-21 AC-22 AC-23 AC-24 AC-25 AC-3 AC-4 AC-5 AC-6 AC-7 AC-8 AC-9