Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SC

SC-29Heterogeneity

Employ a diverse set of information technologies for the following system components in the implementation of the system: {{ insert: param, sc-29_odp }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (5)

Weaknesses this control addresses (5)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-693Protection Mechanism Failure476Diverse technology stacks ensure a single protection mechanism failure (or exploit) does not cascade across all components.
CWE-829Inclusion of Functionality from Untrusted Control Sphere254Diversity of sources and implementations limits the blast radius when functionality is drawn from untrusted control spheres.
CWE-506Embedded Malicious Code80Embedding malicious code becomes far harder to achieve uniformly when components use heterogeneous languages, runtimes, and hardware.
CWE-1104Use of Unmaintained Third Party Components19Using multiple distinct technologies reduces systemic dependence on any single third-party component and its potential unmaintained vulnerabilities.
CWE-657Violation of Secure Design Principles19Directly implements the secure design principle of diversity, preventing homogeneous monocultures that share identical weaknesses.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family SC

SC-1 SC-10 SC-11 SC-12 SC-13 SC-14 SC-15 SC-16 SC-17 SC-18 SC-19 SC-2 SC-20 SC-21 SC-22 SC-23 SC-24 SC-25 SC-26 SC-27 SC-28 SC-3 SC-30 SC-31 SC-32 SC-33 SC-34 SC-35 SC-36 SC-37 SC-38 SC-39 SC-4 SC-40 SC-41 SC-42 SC-43 SC-44 SC-45 SC-46 SC-47 SC-48 SC-49 SC-5 SC-50 SC-51 SC-6 SC-7 SC-8 SC-9