Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family PL

PL-8Security and Privacy Architectures

Develop security and privacy architectures for the system that: Describe the requirements and approach to be taken for protecting the confidentiality, integrity, and availability of organizational information; Describe the requirements and approach to be taken for processing personally identifiable information to minimize privacy risk to individuals; Describe how the architectures are integrated into and support the enterprise architecture; and Describe any assumptions about, and dependencies on, external systems and services; Review and update the architectures {{ insert: param, pl-08_odp }} to reflect changes in the enterprise architecture; and Reflect planned architecture changes in security and privacy plans, Concept of Operations (CONOPS), criticality analysis, organizational procedures, and procurements and acquisitions.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (10)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,204Privacy and security architectures require controls to protect sensitive information from unauthorized exposure across the system lifecycle.
CWE-284Improper Access Control4,832Architectures explicitly define requirements and mechanisms for access control to protect confidentiality, integrity, and availability.
CWE-287Improper Authentication4,730Security architectures must specify authentication requirements and approaches, making systemic authentication weaknesses harder to introduce.
CWE-306Missing Authentication for Critical Function2,567The control requires architectures to identify and protect critical functions, including mandatory authentication for those functions.
CWE-285Improper Authorization1,230The control mandates describing authorization approaches integrated into the enterprise architecture, directly reducing improper authorization risks.
CWE-311Missing Encryption of Sensitive Data552Architectures must describe confidentiality protections, which includes mandating encryption for sensitive data in transit and at rest.
CWE-693Protection Mechanism Failure476By requiring integrated, updated architectures and CONOPS, the control reduces the likelihood that protection mechanisms are missing or inconsistently applied.
CWE-359Exposure of Private Personal Information to an Unauthorized Actor174The control specifically requires architectures that minimize privacy risk when processing PII, directly addressing exposure of personal information.
CWE-653Improper Isolation or Compartmentalization52Security architectures commonly incorporate isolation and compartmentalization strategies to limit the impact of compromises.
CWE-657Violation of Secure Design Principles19Developing and maintaining documented security architectures enforces secure design principles and prevents violations at the system level.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family PL

PL-1 PL-10 PL-11 PL-2 PL-3 PL-4 PL-5 PL-6 PL-7 PL-9