Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SI

SI-4System Monitoring

Monitor the system to detect: Attacks and indicators of potential attacks in accordance with the following monitoring objectives: {{ insert: param, si-04_odp.01 }} ; and Unauthorized local, network, and remote connections; Identify unauthorized use of the system through the following techniques and methods: {{ insert: param, si-04_odp.02 }}; Invoke internal monitoring capabilities or deploy monitoring devices: Strategically within the system to collect organization-determined essential information; and At ad hoc locations within the system to track specific types of transactions of interest to the organization; Analyze detected events and anomalies; Adjust the level of system monitoring activity when there is a change in risk to organizational operations and assets, individuals, other organizations, or the Nation; Obtain legal opinion regarding system monitoring activities; and Provide {{ insert: param, si-04_odp.03 }} to {{ insert: param, si-04_odp.04 }} {{ insert: param, si-04_odp.05 }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (1)

ATT&CK techniques this control mitigates (373)

Weaknesses this control addresses (9)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-119Improper Restriction of Operations within the Bounds of a Memory Buffer14,126Detects exploitation attempts that produce memory corruption, crashes, or anomalous behavior.
CWE-352Cross-Site Request Forgery (CSRF)10,337Detects anomalous request patterns consistent with cross-site request forgery.
CWE-284Improper Access Control4,832Directly detects unauthorized local/network/remote connections and system use that result from improper access control.
CWE-287Improper Authentication4,730Detects unauthorized use and connections stemming from authentication bypass or failure.
CWE-74Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')4,689Identifies indicators of injection attacks (command, SQL, LDAP, etc.) via anomaly and attack monitoring.
CWE-400Uncontrolled Resource Consumption3,324Monitors for resource exhaustion and denial-of-service patterns that indicate uncontrolled consumption.
CWE-918Server-Side Request Forgery (SSRF)2,872Detects server-side request forgery through monitoring of unexpected outbound connections.
CWE-611Improper Restriction of XML External Entity Reference1,490Identifies XML external entity processing via monitoring of unusual file/network access or resource usage.
CWE-693Protection Mechanism Failure476Reveals failures or bypasses of existing protection mechanisms via event and anomaly analysis.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-61882 KEV9.39.80.8938good
CVE-2025-10035 KEV7.310.00.5520partial
CVE-2025-712437.19.80.8541partial
CVE-2025-20333 KEV5.59.90.2514partial
CVE-2026-269805.19.40.5431partial
CVE-2026-290585.09.80.5086partial
CVE-2025-252564.89.80.4659partial
CVE-2022-31803.49.80.2352partial
CVE-2025-75262.19.80.0164partial
CVE-2026-228972.09.80.0039partial
CVE-2026-250702.09.80.0028partial
CVE-2025-250672.09.80.0092partial
CVE-2025-43202.010.00.0010good
CVE-2025-662592.09.80.0047partial
CVE-2026-236962.09.90.0007partial
CVE-2025-575152.09.80.0027partial
CVE-2025-15642.09.80.0019partial
CVE-2024-551602.09.80.0011partial
CVE-2025-620252.09.80.0010partial
CVE-2022-238512.09.80.0010partial
CVE-2026-310402.09.80.0012partial
CVE-2026-276502.09.80.0007good
CVE-2026-321942.09.80.0012partial
CVE-2026-321912.09.80.0012partial
CVE-2026-315362.09.80.0005partial

Other controls in family SI

SI-1 SI-10 SI-11 SI-12 SI-13 SI-14 SI-15 SI-16 SI-17 SI-18 SI-19 SI-2 SI-20 SI-21 SI-22 SI-23 SI-3 SI-5 SI-6 SI-7 SI-8 SI-9