Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SC

SC-49Hardware-enforced Separation and Policy Enforcement

Implement hardware-enforced separation and policy enforcement mechanisms between {{ insert: param, sc-49_odp }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (6)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,832Hardware-enforced separation directly implements strong access control boundaries that software alone cannot bypass.
CWE-269Improper Privilege Management2,907Hardware policy enforcement prevents improper privilege assignment or escalation across separated execution domains.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Hardware mechanisms enforce correct permission assignments on critical resources that would otherwise be modifiable by software.
CWE-693Protection Mechanism Failure476Hardware enforcement reduces the likelihood that protection mechanisms can be bypassed or fail due to software flaws.
CWE-250Execution with Unnecessary Privileges305Mandatory hardware separation makes it harder to run code with unnecessary privileges by isolating privilege domains.
CWE-653Improper Isolation or Compartmentalization52The control explicitly provides hardware-backed isolation and compartmentalization between domains or components.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-65732.09.80.0021good

Other controls in family SC

SC-1 SC-10 SC-11 SC-12 SC-13 SC-14 SC-15 SC-16 SC-17 SC-18 SC-19 SC-2 SC-20 SC-21 SC-22 SC-23 SC-24 SC-25 SC-26 SC-27 SC-28 SC-29 SC-3 SC-30 SC-31 SC-32 SC-33 SC-34 SC-35 SC-36 SC-37 SC-38 SC-39 SC-4 SC-40 SC-41 SC-42 SC-43 SC-44 SC-45 SC-46 SC-47 SC-48 SC-5 SC-50 SC-51 SC-6 SC-7 SC-8 SC-9