Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family CM

CM-5Access Restrictions for Change

Define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (160)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-862Missing Authorization8,680Mandating authorization for changes prevents missing authorization checks on critical modification functions.
CWE-284Improper Access Control4,832Enforcing physical and logical access restrictions for system changes directly prevents unauthorized actors from modifying the system.
CWE-863Incorrect Authorization3,234The control requires correct implementation of authorization specifically tied to change operations.
CWE-269Improper Privilege Management2,907Restricting who can perform changes helps ensure privileges are managed properly rather than assigned broadly.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Defining and enforcing access restrictions ensures correct permission assignments on resources that support changes.
CWE-285Improper Authorization1,230Requiring definition, approval, and enforcement of access rules for changes addresses improper authorization of modifications.
CWE-250Execution with Unnecessary Privileges305Limiting change access to only approved entities reduces the risk of unnecessary privileges being available for modifications.
CWE-15External Control of System or Configuration Setting59Restricting changes to system and configuration settings prevents external entities from controlling those settings without approval.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2024-575202.29.80.0352good
CVE-2024-392731.89.00.0031good
CVE-2016-200251.88.80.0003good
CVE-2021-478521.88.80.0003good
CVE-2025-416661.88.80.0118good
CVE-2026-19951.67.80.0001good
CVE-2026-335091.57.50.0010good
CVE-2026-354641.57.50.0018good
CVE-2023-471792.98.80.1915good
CVE-2026-350292.78.80.1494good
CVE-2026-228692.09.80.0015good
CVE-2024-396082.010.00.0026good
CVE-2025-110072.09.80.0028good
CVE-2026-355462.09.80.0007good
CVE-2019-255682.09.80.0003good
CVE-2026-62352.09.80.0003good
CVE-2026-428122.09.90.0006partial
CVE-2016-200242.09.80.0003good
CVE-2026-31302.09.80.0002partial
CVE-2025-636901.99.10.0172good
CVE-2025-551411.98.80.0288good
CVE-2025-09281.98.80.0232good
CVE-2021-477701.88.80.0033good
CVE-2024-397881.89.10.0004good
CVE-2021-477351.88.80.0049good

Other controls in family CM

CM-1 CM-10 CM-11 CM-12 CM-13 CM-14 CM-2 CM-3 CM-4 CM-6 CM-7 CM-8 CM-9