Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SC

SC-39Process Isolation

Maintain a separate execution domain for each executing system process.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (22)

Weaknesses this control addresses (6)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,832Maintaining distinct execution domains directly implements access-control separation between processes, blocking unauthorized cross-process access.
CWE-269Improper Privilege Management2,907Separate execution domains enforce privilege boundaries so that improper privilege management within one process cannot affect others.
CWE-732Incorrect Permission Assignment for Critical Resource1,824By giving each process its own protected domain, the control reduces the impact of incorrect permission assignments on critical resources shared across processes.
CWE-668Exposure of Resource to Wrong Sphere779Process isolation ensures resources remain inside their intended spheres, preventing exposure of a resource to an unintended process.
CWE-250Execution with Unnecessary Privileges305Process isolation confines each process to its own execution domain, preventing one process from exercising the privileges or resources belonging to another.
CWE-653Improper Isolation or Compartmentalization52The control is a direct realization of proper isolation and compartmentalization, eliminating the weakness of shared execution domains.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2026-398612.010.00.0015good
CVE-2025-28572.010.00.0020good
CVE-2024-563462.010.00.0033good
CVE-2025-242492.09.80.0066good
CVE-2026-412652.09.80.0017good
CVE-2026-257252.010.00.0002good
CVE-2025-432752.09.80.0013good
CVE-2025-155401.88.80.0006good
CVE-2026-206671.88.80.0002good
CVE-2024-564441.57.50.0024good
CVE-2026-320481.57.50.0002good
CVE-2024-564431.26.20.0009good
CVE-2024-564351.26.20.0007good
CVE-2026-320461.15.30.0002good
CVE-2025-526430.94.70.0002good
CVE-2025-24201 KEV4.010.00.0024good
CVE-2025-6558 KEV3.88.80.0022good
CVE-2025-43510 KEV3.67.80.0030good
CVE-2026-341563.69.90.2740good
CVE-2025-21590 KEV3.04.40.0175good
CVE-2025-241183.07.10.2702good
CVE-2025-514822.18.80.0579good
CVE-2026-333962.09.90.0097good
CVE-2026-309572.09.90.0010good
CVE-2025-699832.09.80.0036good

Other controls in family SC

SC-1 SC-10 SC-11 SC-12 SC-13 SC-14 SC-15 SC-16 SC-17 SC-18 SC-19 SC-2 SC-20 SC-21 SC-22 SC-23 SC-24 SC-25 SC-26 SC-27 SC-28 SC-29 SC-3 SC-30 SC-31 SC-32 SC-33 SC-34 SC-35 SC-36 SC-37 SC-38 SC-4 SC-40 SC-41 SC-42 SC-43 SC-44 SC-45 SC-46 SC-47 SC-48 SC-49 SC-5 SC-50 SC-51 SC-6 SC-7 SC-8 SC-9