Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family PT

PT-2Authority to Process Personally Identifiable Information

Determine and document the {{ insert: param, pt-02_odp.01 }} that permits the {{ insert: param, pt-02_odp.02 }} of personally identifiable information; and Restrict the {{ insert: param, pt-02_odp.03 }} of personally identifiable information to only that which is authorized.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (7)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,204Limits PII handling to authorized authority, making unauthorized exposure of sensitive information less likely.
CWE-862Missing Authorization8,680Requires explicit determination and documentation of authority before any PII processing occurs, addressing missing authorization.
CWE-284Improper Access Control4,832Requires documented authority and explicit restriction of PII processing to only authorized actions, directly mitigating improper access control.
CWE-863Incorrect Authorization3,234Restricts processing strictly to documented authorized uses, mitigating incorrect authorization decisions for sensitive data.
CWE-285Improper Authorization1,230Mandates determining authority and limiting processing to what is authorized, preventing improper authorization over personal data.
CWE-359Exposure of Private Personal Information to an Unauthorized Actor174Enforces restriction of PII processing to authorized purposes, reducing exposure of private personal information to unauthorized actors.
CWE-213Exposure of Sensitive Information Due to Incompatible Policies29Demands documented authority and policy alignment for PII processing, reducing exposure due to incompatible or absent policies.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family PT

PT-1 PT-3 PT-4 PT-5 PT-6 PT-7 PT-8