Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family CM

CM-12Information Location

Identify and document the location of {{ insert: param, cm-12_odp }} and the specific system components on which the information is processed and stored; Identify and document the users who have access to the system and system components where the information is processed and stored; and Document changes to the location (i.e., system or system components) where the information is processed and stored.

Last updated: 19 May 2026 14:18 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (2)

Weaknesses this control addresses (9)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,259Documenting information locations and authorized users enables better protection against unauthorized exposure of sensitive data.
CWE-284Improper Access Control4,905Identifying users with access to specific system components supports enforcement of proper access controls on information.
CWE-732Incorrect Permission Assignment for Critical Resource1,837Documenting users and component locations facilitates correct permission assignments for critical resources.
CWE-285Improper Authorization1,252Documenting access to processing and storage locations helps ensure correct authorization for information resources.
CWE-668Exposure of Resource to Wrong Sphere788Knowing exact processing and storage locations helps avoid exposure of resources to incorrect spheres.
CWE-552Files or Directories Accessible to External Parties551Identifying and documenting file and directory locations allows restriction of access to external parties.
CWE-922Insecure Storage of Sensitive Information422Tracking information locations and access supports secure storage practices instead of insecure ones.
CWE-497Exposure of Sensitive System Information to an Unauthorized Control Sphere318Documenting where system information is processed and stored prevents exposure to unauthorized control spheres.
CWE-359Exposure of Private Personal Information to an Unauthorized Actor178Tracking locations of sensitive data and access users reduces risk of private personal information exposure.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-242632.09.80.0062good
CVE-2025-673031.67.50.0132good
CVE-2024-136001.57.50.0032good
CVE-2025-125392.010.00.0072good
CVE-2024-135621.57.50.0059good

Other controls in family CM

CM-1 CM-10 CM-11 CM-13 CM-14 CM-2 CM-3 CM-4 CM-5 CM-6 CM-7 CM-8 CM-9