Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SA

SA-16Developer-provided Training

Require the developer of the system, system component, or system service to provide the following training on the correct use and operation of the implemented security and privacy functions, controls, and/or mechanisms: {{ insert: param, sa-16_odp }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (3)

Weaknesses this control addresses (9)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,832Explicit training on access control mechanisms and their operation makes improper access control harder to introduce via misconfiguration.
CWE-287Improper Authentication4,730Developer-provided instruction on authentication controls improves correct implementation and ongoing operation of authentication.
CWE-269Improper Privilege Management2,907Developer training on implemented privilege management controls prevents improper assignment or escalation through correct configuration and operation.
CWE-306Missing Authentication for Critical Function2,567Training emphasizes enabling and properly using authentication for critical functions, reducing missing authentication exposures.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Training on security functions includes correct permission assignment for critical resources, lowering misconfiguration risk.
CWE-276Incorrect Default Permissions1,757Training covers proper setting of permissions on resources, reducing incorrect default or inherited permissions after deployment.
CWE-285Improper Authorization1,230Training on authorization functions and controls reduces authorization bypasses stemming from incorrect setup or use.
CWE-250Execution with Unnecessary Privileges305Training on correct operation of privilege-related security functions directly reduces unnecessary privilege execution by teaching least-privilege usage.
CWE-1188Initialization of a Resource with an Insecure Default300Instruction on secure initialization of security controls prevents leaving resources with insecure defaults after installation.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family SA

SA-1 SA-10 SA-11 SA-12 SA-13 SA-14 SA-15 SA-17 SA-18 SA-19 SA-2 SA-20 SA-21 SA-22 SA-23 SA-24 SA-3 SA-4 SA-5 SA-6 SA-7 SA-8 SA-9