Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family IA

IA-12Identity Proofing

Identity proof users that require accounts for logical access to systems based on appropriate identity assurance level requirements as specified in applicable standards and guidelines; Resolve user identities to a unique individual; and Collect, validate, and verify identity evidence.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (4)

Weaknesses this control addresses (2)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-287Improper Authentication4,730Identity proofing requires collecting, validating, and verifying evidence to resolve claims to unique individuals, directly preventing insufficient proof of identity during account establishment.
CWE-290Authentication Bypass by Spoofing631Requiring verifiable identity evidence at appropriate assurance levels makes it substantially harder for attackers to successfully spoof or impersonate users to obtain accounts.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-16712.09.80.0019good
CVE-2026-62661.78.30.0004good

Other controls in family IA

IA-1 IA-10 IA-11 IA-13 IA-2 IA-3 IA-4 IA-5 IA-6 IA-7 IA-8 IA-9