Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family AC

AC-16Security and Privacy Attributes

Provide the means to associate {{ insert: param, ac-16_prm_1 }} with {{ insert: param, ac-16_prm_2 }} for information in storage, in process, and/or in transmission; Ensure that the attribute associations are made and retained with the information; Establish the following permitted security and privacy attributes from the attributes defined in [AC-16a](#ac-16_smt.a) for {{ insert: param, ac-16_prm_3 }}: {{ insert: param, ac-16_prm_4 }}; Determine the following permitted attribute values or ranges for each of the established attributes: {{ insert: param, ac-16_odp.09 }}; Audit changes to attributes; and Review {{ insert: param, ac-16_prm_6 }} for applicability {{ insert: param, ac-16_prm_7 }}.

Last updated: 19 May 2026 20:20 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (57)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,260Proper attribute retention and permitted-value enforcement limits unauthorized actors from accessing sensitive information lacking correct labels.
CWE-862Missing Authorization8,799Requiring attribute association with information prevents authorization from being performed without necessary security or privacy context.
CWE-284Improper Access Control4,907Associating and retaining security attributes with data directly supports enforcement of access control decisions across storage, processing, and transmission.
CWE-863Incorrect Authorization3,305Defining permitted attribute values and auditing modifications reduces the chance of incorrect authorization outcomes due to tampered or missing labels.
CWE-732Incorrect Permission Assignment for Critical Resource1,837Attribute management for resources provides a mechanism to assign and maintain correct permissions based on security labels.
CWE-285Improper Authorization1,252Establishing permitted attributes and values, plus auditing changes, ensures authorization decisions are based on correctly managed policy data.
CWE-359Exposure of Private Personal Information to an Unauthorized Actor178Privacy-specific attributes and their controlled association directly reduce exposure of private personal information through missing or incorrect labeling.
CWE-1220Insufficient Granularity of Access Control83Use of granular security and privacy attributes enables finer access control than coarse permission models alone.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-503281.57.30.0003good
CVE-2025-0411 KEV6.27.00.4672good
CVE-2026-329752.09.80.0008good
CVE-2026-28474 UPD2.09.80.0007good
CVE-2025-653181.89.10.0010good
CVE-2026-4503 UPD1.57.50.0007partial
CVE-2026-328941.47.10.0004good
CVE-2026-412991.47.10.0006good
CVE-2025-241672.09.80.0034partial
CVE-2025-459682.09.80.0041good
CVE-2025-432322.09.80.0012good
CVE-2026-258761.89.10.0008partial
CVE-2026-258101.89.10.0008good
CVE-2026-350451.68.10.0004partial
CVE-2026-340551.68.10.0001partial
CVE-2025-03521.57.50.0010partial
CVE-2026-321231.57.70.0013partial
CVE-2026-257581.57.50.0003partial

Other controls in family AC

AC-1 AC-10 AC-11 AC-12 AC-13 AC-14 AC-15 AC-17 AC-18 AC-19 AC-2 AC-20 AC-21 AC-22 AC-23 AC-24 AC-25 AC-3 AC-4 AC-5 AC-6 AC-7 AC-8 AC-9