Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family PM

PM-7Enterprise Architecture

Develop and maintain an enterprise architecture with consideration for information security, privacy, and the resulting risk to organizational operations and assets, individuals, other organizations, and the Nation.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,832Enterprise architecture defines overarching access control models, boundaries, and trust zones that directly prevent improper access control weaknesses.
CWE-287Improper Authentication4,730Security-conscious enterprise architecture mandates authentication mechanisms and identity management at scale, mitigating improper authentication.
CWE-269Improper Privilege Management2,907Enterprise architecture incorporates least-privilege principles and role definitions organization-wide, addressing improper privilege management.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Architecture standards define default and required permission models for critical resources, mitigating incorrect permission assignments.
CWE-285Improper Authorization1,230Architecture planning establishes authorization policies and enforcement points across systems, reducing improper authorization flaws.
CWE-693Protection Mechanism Failure476Enterprise architecture ensures protection mechanisms are selected, placed, and integrated consistently, reducing protection mechanism failures.
CWE-653Improper Isolation or Compartmentalization52Architecture explicitly designs isolation, segmentation, and compartmentalization (e.g., networks, data flows), preventing improper isolation weaknesses.
CWE-657Violation of Secure Design Principles19The control requires explicit consideration of secure design principles during architecture development, directly countering violation of those principles.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family PM

PM-1 PM-10 PM-11 PM-12 PM-13 PM-14 PM-15 PM-16 PM-17 PM-18 PM-19 PM-2 PM-20 PM-21 PM-22 PM-23 PM-24 PM-25 PM-26 PM-27 PM-28 PM-29 PM-3 PM-30 PM-31 PM-32 PM-4 PM-5 PM-6 PM-8 PM-9