Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family AC

AC-23Data Mining Protection

Employ {{ insert: param, ac-23_odp.01 }} for {{ insert: param, ac-23_odp.02 }} to detect and protect against unauthorized data mining.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (15)

Weaknesses this control addresses (6)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,204Data mining protection mechanisms detect and block unauthorized bulk extraction of sensitive data, directly mitigating exposure to unauthorized actors.
CWE-284Improper Access Control4,832Provides monitoring and protection against data mining patterns that exploit improper access controls to extract data.
CWE-285Improper Authorization1,230Detects and blocks data mining attempts that violate intended authorization boundaries for data access.
CWE-668Exposure of Resource to Wrong Sphere779Protects against data mining that would expose resources to unauthorized spheres by enforcing detection and controls.
CWE-497Exposure of Sensitive System Information to an Unauthorized Control Sphere314Employs detection to prevent unauthorized mining of sensitive system information from being exfiltrated to external control spheres.
CWE-359Exposure of Private Personal Information to an Unauthorized Actor174The control detects and protects against mining of private personal information, reducing unauthorized exposure of PII.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family AC

AC-1 AC-10 AC-11 AC-12 AC-13 AC-14 AC-15 AC-16 AC-17 AC-18 AC-19 AC-2 AC-20 AC-21 AC-22 AC-24 AC-25 AC-3 AC-4 AC-5 AC-6 AC-7 AC-8 AC-9