Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family IA

IA-10Adaptive Authentication

Require individuals accessing the system to employ {{ insert: param, ia-10_odp.01 }} under specific {{ insert: param, ia-10_odp.02 }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (5)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-287Improper Authentication4,730Requires adaptive authentication under specific conditions, directly strengthening authentication mechanisms against improper or insufficient authentication.
CWE-306Missing Authentication for Critical Function2,567Mandates additional authentication for access under defined conditions, ensuring critical or high-risk functions are not left without authentication.
CWE-307Improper Restriction of Excessive Authentication Attempts684Specific conditions can include excessive failed attempts, triggering stronger authentication that restricts brute-force exploitation.
CWE-288Authentication Bypass Using an Alternate Path or Channel523Adaptive requirements can apply across access paths, reducing the ability to bypass authentication via alternate channels or paths.
CWE-1390Weak Authentication75Enforces dynamic, context-aware authentication that mitigates weak static authentication by increasing requirements based on risk or conditions.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2026-309691.89.10.0006good
CVE-2025-692462.09.80.0006partial

Other controls in family IA

IA-1 IA-11 IA-12 IA-13 IA-2 IA-3 IA-4 IA-5 IA-6 IA-7 IA-8 IA-9