Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SR

SR-5Acquisition Strategies, Tools, and Methods

Employ the following acquisition strategies, contract tools, and procurement methods to protect against, identify, and mitigate supply chain risks: {{ insert: param, sr-05_odp }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (15)

Weaknesses this control addresses (5)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-829Inclusion of Functionality from Untrusted Control Sphere254Procurement methods and contract requirements can mandate use of vetted, controlled sources instead of arbitrary third-party or untrusted control spheres.
CWE-494Download of Code Without Integrity Check242Acquisition strategies can stipulate that delivered code or firmware must be signed and integrity-checked, making downloads without verification contractually non-compliant.
CWE-506Embedded Malicious Code80Acquisition strategies can require trusted suppliers, code reviews, and integrity attestations that directly reduce the likelihood of receiving components with embedded malicious code.
CWE-912Hidden Functionality79Supply-chain controls such as supplier audits and functional verification requirements make insertion of hidden or undocumented functionality harder to achieve undetected.
CWE-1104Use of Unmaintained Third Party Components19Contract tools and acquisition criteria can explicitly require ongoing vendor support, patching commitments, and avoidance of unmaintained third-party components.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family SR

SR-1 SR-10 SR-11 SR-12 SR-2 SR-3 SR-4 SR-6 SR-7 SR-8 SR-9