Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SR

SR-12Component Disposal

Dispose of {{ insert: param, sr-12_odp.01 }} using the following techniques and methods: {{ insert: param, sr-12_odp.02 }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (6)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,204Secure disposal techniques directly prevent sensitive data from becoming accessible to unauthorized actors after components leave organizational control.
CWE-668Exposure of Resource to Wrong Sphere779Ensures components are not exposed to an external or disposal sphere while still containing sensitive data or resources.
CWE-459Incomplete Cleanup215Enforces complete cleanup and sanitization steps during disposal, closing gaps that leave data remnants on retired components.
CWE-212Improper Removal of Sensitive Information Before Storage or Transfer126Requires explicit removal of sensitive information prior to component transfer or disposal, reducing exposure from retained data.
CWE-669Incorrect Resource Transfer Between Spheres96Addresses incorrect transfer of resources to an uncontrolled sphere by requiring approved destruction or sanitization methods.
CWE-226Sensitive Information in Resource Not Removed Before Reuse30Mandates sanitization of resources before they are released or discarded, preventing residual sensitive information from being recovered.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family SR

SR-1 SR-10 SR-11 SR-2 SR-3 SR-4 SR-5 SR-6 SR-7 SR-8 SR-9