Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SI

SI-23Information Fragmentation

Based on {{ insert: param, si-23_odp.01 }}: Fragment the following information: {{ insert: param, si-23_odp.02 }} ; and Distribute the fragmented information across the following systems or system components: {{ insert: param, si-23_odp.03 }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (7)

Weaknesses this control addresses (4)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,204Fragmentation across systems ensures that exposure from any single component yields only incomplete information, directly reducing the impact of unauthorized disclosure.
CWE-284Improper Access Control4,832Compromise of access control on any one system or component still leaves an attacker with only a useless fragment, limiting the practical exploitability of the weakness.
CWE-668Exposure of Resource to Wrong Sphere779Distributing fragments into separate spheres means a resource leak or exposure on one system does not place the full sensitive information into the wrong sphere.
CWE-922Insecure Storage of Sensitive Information421Storing information as fragments on distinct components is an architectural control that avoids insecure single-location storage of the complete sensitive data set.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family SI

SI-1 SI-10 SI-11 SI-12 SI-13 SI-14 SI-15 SI-16 SI-17 SI-18 SI-19 SI-2 SI-20 SI-21 SI-22 SI-3 SI-4 SI-5 SI-6 SI-7 SI-8 SI-9