Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family PM

PM-3Information Security and Privacy Resources

Include the resources needed to implement the information security and privacy programs in capital planning and investment requests and document all exceptions to this requirement; Prepare documentation required for addressing information security and privacy programs in capital planning and investment requests in accordance with applicable laws, executive orders, directives, policies, regulations, standards; and Make available for expenditure, the planned information security and privacy resources.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (7)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,832Resources allocated to security programs enable proper design, implementation, and maintenance of access control mechanisms.
CWE-798Use of Hard-coded Credentials1,955Planned investment enables secure credential storage and management systems instead of hard-coded credentials.
CWE-327Use of a Broken or Risky Cryptographic Algorithm736Capital planning and funding allow selection and ongoing support of strong cryptographic algorithms rather than weak or broken ones.
CWE-693Protection Mechanism Failure476Explicit funding and documentation requirements reduce failures of protection mechanisms caused by under-resourcing.
CWE-521Weak Password Requirements303Dedicated security resources support deployment of strong authentication systems and enforcement of robust password policies.
CWE-1104Use of Unmaintained Third Party Components19Resource allocation in investment requests funds regular maintenance, patching, and updates of third-party components.
CWE-657Violation of Secure Design Principles19Requiring security resources in capital planning supports adherence to secure design principles throughout the system lifecycle.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family PM

PM-1 PM-10 PM-11 PM-12 PM-13 PM-14 PM-15 PM-16 PM-17 PM-18 PM-19 PM-2 PM-20 PM-21 PM-22 PM-23 PM-24 PM-25 PM-26 PM-27 PM-28 PM-29 PM-30 PM-31 PM-32 PM-4 PM-5 PM-6 PM-7 PM-8 PM-9