NIST 800-53 r5 · Controls catalogue · Family SC
SC-25Thin Nodes
Employ minimal functionality and information storage on the following system components: {{ insert: param, sc-25_odp }}.
Last updated: 09 May 2026 03:25 UTC
Implementations targeting this control (0)
- No implementations targeting this control yet.
ATT&CK techniques this control mitigates (0)
- No ATT&CK techniques mapped to this control yet.
Weaknesses this control addresses (7)AI
CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.
| CWE | Name | CVEs | Why this control addresses it |
|---|---|---|---|
CWE-200 | Exposure of Sensitive Information to an Unauthorized Actor | 10,204 | Minimal information storage directly reduces the quantity of sensitive data resident on the component that could be exposed. |
CWE-250 | Execution with Unnecessary Privileges | 305 | Minimal functionality inherently eliminates execution of unneeded code paths and associated privileges. |
CWE-749 | Exposed Dangerous Method or Function | 153 | Minimal functionality removes or avoids exposure of dangerous methods and functions. |
CWE-506 | Embedded Malicious Code | 80 | Reduced code footprint and storage make insertion or persistence of embedded malicious code far less feasible. |
CWE-912 | Hidden Functionality | 79 | Constrained functionality and storage surface leave little room for hidden or undocumented functionality. |
CWE-489 | Active Debug Code | 75 | Minimal functionality precludes inclusion of active debug code or diagnostic interfaces. |
CWE-1104 | Use of Unmaintained Third Party Components | 19 | Fewer components and services mean reduced attack surface from unmaintained third-party code. |
Top CVEs where this control is the strongest mitigation
| CVE | Risk | CVSS | EPSS | Match |
|---|---|---|---|---|
| No CVEs annotated to this control yet — the per-CVE backfill is in progress. | ||||