Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SC

SC-43Usage Restrictions

Establish usage restrictions and implementation guidelines for the following system components: {{ insert: param, sc-43_odp }} ; and Authorize, monitor, and control the use of such components within the system.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (5)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-862Missing Authorization8,680The control mandates authorization prior to allowing use of designated components, eliminating missing authorization paths.
CWE-284Improper Access Control4,832Requiring authorization, monitoring, and control of component use directly enforces access control decisions on system resources.
CWE-863Incorrect Authorization3,234Ongoing monitoring and control of component usage detects and stops incorrect authorization decisions at runtime.
CWE-269Improper Privilege Management2,907Usage restrictions and implementation guidelines limit how privileges may be exercised with the specified components.
CWE-306Missing Authentication for Critical Function2,567Requiring authorization for listed components ensures authentication occurs before critical functions are invoked.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Establishing usage restrictions and guidelines directly addresses assignment of appropriate permissions to critical components.
CWE-285Improper Authorization1,230Explicit authorization step before component use prevents actions that bypass intended authorization checks.
CWE-250Execution with Unnecessary Privileges305Authorizing only necessary component uses reduces the chance of processes running with extraneous privileges.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family SC

SC-1 SC-10 SC-11 SC-12 SC-13 SC-14 SC-15 SC-16 SC-17 SC-18 SC-19 SC-2 SC-20 SC-21 SC-22 SC-23 SC-24 SC-25 SC-26 SC-27 SC-28 SC-29 SC-3 SC-30 SC-31 SC-32 SC-33 SC-34 SC-35 SC-36 SC-37 SC-38 SC-39 SC-4 SC-40 SC-41 SC-42 SC-44 SC-45 SC-46 SC-47 SC-48 SC-49 SC-5 SC-50 SC-51 SC-6 SC-7 SC-8 SC-9