Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family CP

CP-10System Recovery and Reconstitution

Provide for the recovery and reconstitution of the system to a known state within {{ insert: param, cp-10_prm_1 }} after a disruption, compromise, or failure.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (12)

Weaknesses this control addresses (7)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,832Recovery to a known state reverts unauthorized changes to access control mechanisms after compromise.
CWE-287Improper Authentication4,730System recovery re-establishes trusted authentication processes following a compromise.
CWE-269Improper Privilege Management2,907Recovery ensures return to a state with correctly assigned and managed privileges.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Reconstitution corrects improper permission assignments on critical resources.
CWE-285Improper Authorization1,230Reconstitution restores proper authorization policies and enforcement that may have been altered.
CWE-506Embedded Malicious Code80Reverting to a known state removes any malicious code embedded by an attacker.
CWE-912Hidden Functionality79Recovery eliminates hidden functionality or backdoors introduced during compromise.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2026-278431.89.10.0008partial

Other controls in family CP

CP-1 CP-11 CP-12 CP-13 CP-2 CP-3 CP-4 CP-5 CP-6 CP-7 CP-8 CP-9