Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family IR

IR-9Information Spillage Response

Respond to information spills by: Assigning {{ insert: param, ir-09_odp.01 }} with responsibility for responding to information spills; Identifying the specific information involved in the system contamination; Alerting {{ insert: param, ir-09_odp.02 }} of the information spill using a method of communication not associated with the spill; Isolating the contaminated system or system component; Eradicating the information from the contaminated system or component; Identifying other systems or system components that may have been subsequently contaminated; and Performing the following additional actions: {{ insert: param, ir-09_odp.03 }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (6)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,204The control's identification, isolation, alerting, and eradication steps directly limit the impact and exploitation window of unauthorized sensitive information exposure.
CWE-532Insertion of Sensitive Information into Log File1,378The process of identifying and eradicating spilled information applies directly to sensitive data inserted into log files.
CWE-212Improper Removal of Sensitive Information Before Storage or Transfer126Eradication of spilled information from contaminated systems mitigates the effects of improper removal of sensitive data before storage or transfer.
CWE-538Insertion of Sensitive Information into Externally-Accessible File or Directory84Isolation and eradication reduce the ability to exploit sensitive information inserted into externally-accessible files or directories.
CWE-226Sensitive Information in Resource Not Removed Before Reuse30The eradication and cross-system identification steps ensure sensitive information is removed before resources are reused or further accessed.
CWE-540Inclusion of Sensitive Information in Source Code29Detection and removal of spilled information addresses cases where sensitive data was included in source code.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family IR

IR-1 IR-10 IR-2 IR-3 IR-4 IR-5 IR-6 IR-7 IR-8