Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family PT

PT-8Computer Matching Requirements

When a system or organization processes information for the purpose of conducting a matching program: Obtain approval from the Data Integrity Board to conduct the matching program; Develop and enter into a computer matching agreement; Publish a matching notice in the Federal Register; Independently verify the information produced by the matching program before taking adverse action against an individual, if required; and Provide individuals with notice and an opportunity to contest the findings before taking adverse action against an individual.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,204Reduces unauthorized exposure of sensitive information by requiring formal controls, public notice, and due-process steps around all matching activities.
CWE-862Missing Authorization8,680Eliminates missing authorization by requiring documented approval and agreements prior to initiating any computer matching program.
CWE-284Improper Access Control4,832Requires Data Integrity Board approval and formal matching agreements before any cross-system data processing occurs, directly enforcing access control on sensitive matching activities.
CWE-863Incorrect Authorization3,234Addresses incorrect authorization by requiring independent verification of results and an opportunity to contest before any adverse action is taken.
CWE-285Improper Authorization1,230Mandates explicit authorization via agreements and board approval, preventing unauthorized or out-of-scope use of personal data in matching programs.
CWE-345Insufficient Verification of Data Authenticity643Directly requires independent verification of matching output before adverse decisions, mitigating insufficient authenticity checks on data from external sources.
CWE-359Exposure of Private Personal Information to an Unauthorized Actor174Limits exposure of private personal information by restricting matching to approved programs, publishing notices, and allowing individuals to contest findings.
CWE-807Reliance on Untrusted Inputs in a Security Decision74Prevents reliance on untrusted matching results for security-relevant decisions by enforcing verification and contest procedures.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family PT

PT-1 PT-2 PT-3 PT-4 PT-5 PT-6 PT-7