Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family AC

AC-16Security and Privacy Attributes

Provide the means to associate {{ insert: param, ac-16_prm_1 }} with {{ insert: param, ac-16_prm_2 }} for information in storage, in process, and/or in transmission; Ensure that the attribute associations are made and retained with the information; Establish the following permitted security and privacy attributes from the attributes defined in [AC-16a](#ac-16_smt.a) for {{ insert: param, ac-16_prm_3 }}: {{ insert: param, ac-16_prm_4 }}; Determine the following permitted attribute values or ranges for each of the established attributes: {{ insert: param, ac-16_odp.09 }}; Audit changes to attributes; and Review {{ insert: param, ac-16_prm_6 }} for applicability {{ insert: param, ac-16_prm_7 }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (57)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,204Proper attribute retention and permitted-value enforcement limits unauthorized actors from accessing sensitive information lacking correct labels.
CWE-862Missing Authorization8,680Requiring attribute association with information prevents authorization from being performed without necessary security or privacy context.
CWE-284Improper Access Control4,832Associating and retaining security attributes with data directly supports enforcement of access control decisions across storage, processing, and transmission.
CWE-863Incorrect Authorization3,234Defining permitted attribute values and auditing modifications reduces the chance of incorrect authorization outcomes due to tampered or missing labels.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Attribute management for resources provides a mechanism to assign and maintain correct permissions based on security labels.
CWE-285Improper Authorization1,230Establishing permitted attributes and values, plus auditing changes, ensures authorization decisions are based on correctly managed policy data.
CWE-359Exposure of Private Personal Information to an Unauthorized Actor174Privacy-specific attributes and their controlled association directly reduce exposure of private personal information through missing or incorrect labeling.
CWE-1220Insufficient Granularity of Access Control79Use of granular security and privacy attributes enables finer access control than coarse permission models alone.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-503281.57.30.0003good
CVE-2025-0411 KEV6.57.00.5241good
CVE-2026-329752.09.80.0008good
CVE-2026-284742.09.80.0007good
CVE-2025-653181.89.10.0013good
CVE-2026-45031.57.50.0005partial
CVE-2026-328941.47.10.0003good
CVE-2026-412991.47.10.0006good
CVE-2025-241672.09.80.0063partial
CVE-2025-459682.09.80.0034good
CVE-2025-432322.09.80.0011good
CVE-2026-258761.89.10.0008partial
CVE-2026-258101.89.10.0008good
CVE-2026-350451.68.10.0004partial
CVE-2026-340551.68.10.0001partial
CVE-2025-03521.57.50.0010partial

Other controls in family AC

AC-1 AC-10 AC-11 AC-12 AC-13 AC-14 AC-15 AC-17 AC-18 AC-19 AC-2 AC-20 AC-21 AC-22 AC-23 AC-24 AC-25 AC-3 AC-4 AC-5 AC-6 AC-7 AC-8 AC-9