Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SR

SR-9Tamper Resistance and Detection

Implement a tamper protection program for the system, system component, or system service.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (7)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,832Tamper protection directly detects and resists unauthorized modifications that improper access control would otherwise permit.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Provides detection and resistance layers that reduce exploitability of incorrect critical-resource permissions.
CWE-345Insufficient Verification of Data Authenticity643The control implements verification mechanisms that detect tampering by ensuring data authenticity.
CWE-494Download of Code Without Integrity Check242Mandates integrity verification on system components, closing the gap that allows download without checks.
CWE-354Improper Validation of Integrity Check Value184Requires proper validation of integrity mechanisms, directly mitigating flawed check-value handling.
CWE-506Embedded Malicious Code80Tamper detection mechanisms can identify embedded malicious code inserted via supply-chain or runtime tampering.
CWE-353Missing Support for Integrity Check37Tamper protection programs explicitly add integrity checks where support was previously missing.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family SR

SR-1 SR-10 SR-11 SR-12 SR-2 SR-3 SR-4 SR-5 SR-6 SR-7 SR-8