Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SC

SC-2Separation of System and User Functionality

Separate user functionality, including user interface services, from system management functionality.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (8)

Weaknesses this control addresses (7)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,832Explicit separation implements access control boundaries between user interfaces and system management functionality.
CWE-269Improper Privilege Management2,907The control enforces proper privilege boundaries by ensuring user functionality cannot invoke or manage system-level privileges.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Ensures critical system resources and functions receive permission assignments distinct from ordinary user resources.
CWE-668Exposure of Resource to Wrong Sphere779Prevents exposure of system management resources and functions into the user functionality sphere.
CWE-250Execution with Unnecessary Privileges305Separating user-facing code from system management functions directly prevents execution of privileged operations from untrusted user contexts.
CWE-1220Insufficient Granularity of Access Control79Provides the necessary granularity by placing system management functions outside the reach of user-level access controls.
CWE-653Improper Isolation or Compartmentalization52Directly requires isolation/compartmentalization of user services from system management functions.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2026-333341.99.60.0015good
CVE-2026-399111.88.80.0012good
CVE-2026-279521.88.80.0012good
CVE-2026-70641.57.30.0050good
CVE-2025-641272.510.00.0832good
CVE-2026-58532.09.80.0125good
CVE-2026-403171.99.30.0003good
CVE-2025-592521.99.30.0011good
CVE-2026-333361.88.80.0034good
CVE-2025-560981.88.80.0105partial
CVE-2025-242281.67.80.0011good
CVE-2025-04781.67.80.0006good
CVE-2024-443031.57.50.0009good
CVE-2025-241301.15.50.0005good

Other controls in family SC

SC-1 SC-10 SC-11 SC-12 SC-13 SC-14 SC-15 SC-16 SC-17 SC-18 SC-19 SC-20 SC-21 SC-22 SC-23 SC-24 SC-25 SC-26 SC-27 SC-28 SC-29 SC-3 SC-30 SC-31 SC-32 SC-33 SC-34 SC-35 SC-36 SC-37 SC-38 SC-39 SC-4 SC-40 SC-41 SC-42 SC-43 SC-44 SC-45 SC-46 SC-47 SC-48 SC-49 SC-5 SC-50 SC-51 SC-6 SC-7 SC-8 SC-9