Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SC

SC-5Denial-of-service Protection

{{ insert: param, sc-05_odp.02 }} the effects of the following types of denial-of-service events: {{ insert: param, sc-05_odp.01 }} ; and Employ the following controls to achieve the denial-of-service objective: {{ insert: param, sc-05_odp.03 }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (1)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-400Uncontrolled Resource Consumption3,324Directly limits uncontrolled resource consumption that leads to denial-of-service.
CWE-770Allocation of Resources Without Limits or Throttling1,979Requires throttling and limits on resource allocation to prevent exhaustion.
CWE-835Loop with Unreachable Exit Condition ('Infinite Loop')924Detects and mitigates infinite loops that produce sustained resource consumption.
CWE-674Uncontrolled Recursion442Prevents uncontrolled recursion that exhausts stack or CPU resources.
CWE-407Inefficient Algorithmic Complexity83Addresses inefficient algorithms whose complexity can be exploited for DoS.
CWE-409Improper Handling of Highly Compressed Data (Data Amplification)47Limits effects of data amplification from compressed or malicious inputs.
CWE-405Asymmetric Resource Consumption (Amplification)40Employs controls that mitigate amplification attacks causing asymmetric resource use.
CWE-406Insufficient Control of Network Message Volume (Network Amplification)15Implements network message volume controls to block amplification DoS vectors.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2026-312832.09.80.0006good
CVE-2024-127051.87.50.0562good
CVE-2025-583491.89.10.0006good
CVE-2024-28781.87.50.0462good
CVE-2024-373581.88.60.0076good
CVE-2025-552221.78.60.0007good
CVE-2025-268191.78.60.0012good
CVE-2025-234171.78.60.0006good
CVE-2025-552211.78.60.0007good
CVE-2024-488821.78.60.0006good
CVE-2024-125371.77.50.0267good
CVE-2026-261301.77.50.0348good
CVE-2026-340451.68.20.0006good
CVE-2026-354571.68.20.0005good
CVE-2025-213891.67.50.0239good
CVE-2026-74021.68.10.0001good
CVE-2024-466681.67.50.0216good
CVE-2026-54401.67.50.0164good
CVE-2018-251081.67.50.0118good
CVE-2025-212891.67.50.0131good
CVE-2025-274191.67.50.0089good
CVE-2025-10591.57.50.0067good
CVE-2026-334831.57.50.0058good
CVE-2025-253741.57.50.0082good
CVE-2025-301601.57.50.0063good

Other controls in family SC

SC-1 SC-10 SC-11 SC-12 SC-13 SC-14 SC-15 SC-16 SC-17 SC-18 SC-19 SC-2 SC-20 SC-21 SC-22 SC-23 SC-24 SC-25 SC-26 SC-27 SC-28 SC-29 SC-3 SC-30 SC-31 SC-32 SC-33 SC-34 SC-35 SC-36 SC-37 SC-38 SC-39 SC-4 SC-40 SC-41 SC-42 SC-43 SC-44 SC-45 SC-46 SC-47 SC-48 SC-49 SC-50 SC-51 SC-6 SC-7 SC-8 SC-9