Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family CM

CM-12Information Location

Identify and document the location of {{ insert: param, cm-12_odp }} and the specific system components on which the information is processed and stored; Identify and document the users who have access to the system and system components where the information is processed and stored; and Document changes to the location (i.e., system or system components) where the information is processed and stored.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (2)

Weaknesses this control addresses (9)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,204Documenting information locations and authorized users enables better protection against unauthorized exposure of sensitive data.
CWE-284Improper Access Control4,832Identifying users with access to specific system components supports enforcement of proper access controls on information.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Documenting users and component locations facilitates correct permission assignments for critical resources.
CWE-285Improper Authorization1,230Documenting access to processing and storage locations helps ensure correct authorization for information resources.
CWE-668Exposure of Resource to Wrong Sphere779Knowing exact processing and storage locations helps avoid exposure of resources to incorrect spheres.
CWE-552Files or Directories Accessible to External Parties540Identifying and documenting file and directory locations allows restriction of access to external parties.
CWE-922Insecure Storage of Sensitive Information421Tracking information locations and access supports secure storage practices instead of insecure ones.
CWE-497Exposure of Sensitive System Information to an Unauthorized Control Sphere314Documenting where system information is processed and stored prevents exposure to unauthorized control spheres.
CWE-359Exposure of Private Personal Information to an Unauthorized Actor174Tracking locations of sensitive data and access users reduces risk of private personal information exposure.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-242632.09.80.0045good
CVE-2025-673031.67.50.0132good
CVE-2024-136001.57.50.0032good
CVE-2025-125392.010.00.0072good
CVE-2024-135621.57.50.0059good

Other controls in family CM

CM-1 CM-10 CM-11 CM-13 CM-14 CM-2 CM-3 CM-4 CM-5 CM-6 CM-7 CM-8 CM-9