Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family AC

AC-20Use of External Systems

{{ insert: param, ac-20_odp.01 }} , consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to: Access the system from external systems; and Process, store, or transmit organization-controlled information using external systems; or Prohibit the use of {{ insert: param, ac-20_odp.04 }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (64)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,204Prevents unauthorized exposure of sensitive information by prohibiting untrusted external systems from processing or storing it.
CWE-862Missing Authorization8,680Mandates authorization checks before permitting access or data processing via external systems.
CWE-284Improper Access Control4,832Enforces rules governing access to the system and its data from external systems based on established trust relationships.
CWE-863Incorrect Authorization3,234Ensures authorization decisions for external system use are correctly implemented and enforced.
CWE-285Improper Authorization1,230Requires explicit authorization for individuals to use external systems to access or handle organization-controlled information.
CWE-668Exposure of Resource to Wrong Sphere779Controls whether organization resources are exposed to external system spheres by permitting or prohibiting their use.
CWE-653Improper Isolation or Compartmentalization52Defines isolation boundaries by specifying which external systems may access or process organization data.
CWE-501Trust Boundary Violation24Establishes and maintains trust boundaries with external organizations before allowing their systems to interact with organization resources.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-342996.19.80.6960good
CVE-2025-65142.39.60.0617partial
CVE-2026-48512.09.80.0009partial

Other controls in family AC

AC-1 AC-10 AC-11 AC-12 AC-13 AC-14 AC-15 AC-16 AC-17 AC-18 AC-19 AC-2 AC-21 AC-22 AC-23 AC-24 AC-25 AC-3 AC-4 AC-5 AC-6 AC-7 AC-8 AC-9