Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family AC

AC-4Information Flow Enforcement

Enforce approved authorizations for controlling the flow of information within the system and between connected systems based on {{ insert: param, ac-04_odp }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (11)

ATT&CK techniques this control mitigates (158)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-862Missing Authorization8,680Mandates authorization checks and enforcement for all information flows, addressing missing authorization.
CWE-284Improper Access Control4,832Enforcing approved authorizations for information flows directly implements access control over data movements within and between systems.
CWE-863Incorrect Authorization3,234Applies only approved authorizations to information flows, mitigating incorrect authorization decisions.
CWE-285Improper Authorization1,230Requires and applies authorization decisions specifically to control information flows based on policy.
CWE-668Exposure of Resource to Wrong Sphere779Restricts information flows to ensure resources are not exposed to incorrect or unauthorized spheres.
CWE-669Incorrect Resource Transfer Between Spheres96Enforces proper authorization rules for any resource or data transfer between different spheres.
CWE-653Improper Isolation or Compartmentalization52Maintains isolation and compartmentalization by restricting flows between security domains or levels.
CWE-501Trust Boundary Violation24Prevents information from crossing trust boundaries without explicit approved authorizations.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2026-327372.010.00.0002good
CVE-2026-327682.09.90.0006good
CVE-2026-327692.09.80.0003good
CVE-2025-700462.09.80.0006good
CVE-2026-318181.99.60.0001good
CVE-2026-11811.89.00.0002good
CVE-2026-345041.78.30.0005good
CVE-2024-80261.68.10.0009good
CVE-2025-128051.68.10.0001good
CVE-2026-412951.67.80.0001good
CVE-2026-244701.68.10.0004good
CVE-2026-349361.57.70.0001good
CVE-2026-356291.57.40.0004good
CVE-2022-439161.46.80.0010good
CVE-2026-332651.36.30.0008good
CVE-2025-24472 KEV4.28.10.1043good
CVE-2025-342212.29.80.0365good
CVE-2025-551502.18.60.0605good
CVE-2026-329382.09.90.0025good
CVE-2025-595032.010.00.0020good
CVE-2025-242502.09.80.0070partial
CVE-2025-241672.09.80.0063partial
CVE-2025-241722.09.80.0045good
CVE-2026-316682.09.80.0007partial
CVE-2026-22862.09.80.0006good

Other controls in family AC

AC-1 AC-10 AC-11 AC-12 AC-13 AC-14 AC-15 AC-16 AC-17 AC-18 AC-19 AC-2 AC-20 AC-21 AC-22 AC-23 AC-24 AC-25 AC-3 AC-5 AC-6 AC-7 AC-8 AC-9