Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SA

SA-14Criticality Analysis

Criticality Analysis

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (9)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-862Missing Authorization8,680Criticality analysis reveals functions that must be protected by authorization checks, making missing-authorization weaknesses far less likely to affect high-value operations.
CWE-284Improper Access Control4,832The analysis highlights critical resources that require strong access-control enforcement, thereby reducing the chance that improper access control will be present on those resources.
CWE-269Improper Privilege Management2,907By determining which components are critical, the analysis drives proper privilege assignment and management for those components, limiting attacker escalation paths.
CWE-306Missing Authentication for Critical Function2,567Explicit identification of critical functions enables organizations to ensure authentication is applied exactly where it is most needed, preventing missing authentication for those functions.
CWE-732Incorrect Permission Assignment for Critical Resource1,824The control directly supports correct permission assignment by first determining which resources are critical, thereby lowering the likelihood of insecure permissions on those resources.
CWE-285Improper Authorization1,230Criticality analysis identifies functions whose authorization decisions must be correct, making improper authorization flaws less likely to remain exploitable in those areas.
CWE-250Execution with Unnecessary Privileges305Criticality analysis identifies high-impact functions so that unnecessary privileges can be removed from them, directly reducing the exploitability of excessive-privilege weaknesses.
CWE-653Improper Isolation or Compartmentalization52Criticality analysis informs isolation and compartmentalization decisions for high-value components, reducing the attack surface that an adversary can reach after an initial compromise.
CWE-272Least Privilege Violation25Criticality analysis supplies the information needed to enforce least privilege on the most important system elements, making violations of that principle less likely to exist in high-value targets.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family SA

SA-1 SA-10 SA-11 SA-12 SA-13 SA-15 SA-16 SA-17 SA-18 SA-19 SA-2 SA-20 SA-21 SA-22 SA-23 SA-24 SA-3 SA-4 SA-5 SA-6 SA-7 SA-8 SA-9