Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family PM

PM-24Data Integrity Board

Establish a Data Integrity Board to: Review proposals to conduct or participate in a matching program; and Conduct an annual review of all matching programs in which the agency has participated.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,204Annual reviews and proposal scrutiny detect and block matching programs that would expose sensitive data to unauthorized recipients or systems.
CWE-862Missing Authorization8,680Proposal review forces explicit authorization checks for each matching program, preventing execution of matching without required approvals.
CWE-284Improper Access Control4,832Board oversight enforces proper access-control decisions before cross-agency data matching occurs, reducing improper access to protected records.
CWE-863Incorrect Authorization3,234Annual re-evaluation of active programs detects and corrects cases where authorization rules have become incorrect or overly broad.
CWE-285Improper Authorization1,230Mandatory review of matching proposals catches and prevents authorization decisions that would allow data use beyond permitted purposes.
CWE-359Exposure of Private Personal Information to an Unauthorized Actor174The board evaluates privacy implications of proposed matching, directly mitigating exposure of private personal information through uncontrolled data sharing.
CWE-653Improper Isolation or Compartmentalization52Oversight ensures data-matching activities maintain required isolation between distinct data sets and authorized user communities.
CWE-501Trust Boundary Violation24Review of inter-system matching programs identifies and corrects trust-boundary violations before data crosses organizational or policy domains.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family PM

PM-1 PM-10 PM-11 PM-12 PM-13 PM-14 PM-15 PM-16 PM-17 PM-18 PM-19 PM-2 PM-20 PM-21 PM-22 PM-23 PM-25 PM-26 PM-27 PM-28 PM-29 PM-3 PM-30 PM-31 PM-32 PM-4 PM-5 PM-6 PM-7 PM-8 PM-9