Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SC

SC-50Software-enforced Separation and Policy Enforcement

Implement software-enforced separation and policy enforcement mechanisms between {{ insert: param, sc-50_odp }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-862Missing Authorization8,680Requires explicit authorization checks as part of the enforced policy between separated components.
CWE-284Improper Access Control4,832Directly implements software-enforced boundaries that prevent unauthorized access across separated components or domains.
CWE-863Incorrect Authorization3,234Policy enforcement mechanisms correct or prevent flawed authorization logic across domain boundaries.
CWE-269Improper Privilege Management2,907Policy enforcement mechanisms limit privilege escalation and improper privilege assignments across boundaries.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Software-enforced separation ensures correct permission assignments on critical resources between domains.
CWE-285Improper Authorization1,230Enforces policy-based authorization decisions between the separated subjects and objects.
CWE-250Execution with Unnecessary Privileges305Separation and policy enforcement reduce the ability to execute with unnecessary privileges by isolating higher-privilege functions.
CWE-653Improper Isolation or Compartmentalization52Explicitly requires isolation and compartmentalization mechanisms that address failures in separating security domains.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2026-333962.09.90.0097good
CVE-2026-279521.88.80.0012good
CVE-2025-07811.78.60.0004good
CVE-2026-275972.010.00.0077good
CVE-2026-251422.010.00.0022good
CVE-2026-342082.010.00.0020good
CVE-2025-241782.09.80.0067good
CVE-2026-296492.09.80.0002good
CVE-2026-255202.010.00.0005good
CVE-2026-255872.010.00.0003partial
CVE-2026-257252.010.00.0002good
CVE-2026-08812.010.00.0003good
CVE-2025-51202.010.00.0040good
CVE-2026-409591.99.30.0001good
CVE-2025-155401.88.80.0006good
CVE-2025-432571.78.70.0001good
CVE-2026-288911.68.10.0001good
CVE-2026-329881.57.50.0001good
CVE-2025-526430.94.70.0002good
CVE-2026-238302.010.00.0020good
CVE-2026-226862.010.00.0021good
CVE-2026-398882.09.90.0010good
CVE-2026-338972.09.90.0002good
CVE-2026-296462.09.80.0008good
CVE-2026-269542.010.00.0009partial

Other controls in family SC

SC-1 SC-10 SC-11 SC-12 SC-13 SC-14 SC-15 SC-16 SC-17 SC-18 SC-19 SC-2 SC-20 SC-21 SC-22 SC-23 SC-24 SC-25 SC-26 SC-27 SC-28 SC-29 SC-3 SC-30 SC-31 SC-32 SC-33 SC-34 SC-35 SC-36 SC-37 SC-38 SC-39 SC-4 SC-40 SC-41 SC-42 SC-43 SC-44 SC-45 SC-46 SC-47 SC-48 SC-49 SC-5 SC-51 SC-6 SC-7 SC-8 SC-9