Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family CM

CM-5Access Restrictions for Change

Define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.

Last updated: 19 May 2026 14:18 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (160)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-862Missing Authorization8,796Mandating authorization for changes prevents missing authorization checks on critical modification functions.
CWE-284Improper Access Control4,905Enforcing physical and logical access restrictions for system changes directly prevents unauthorized actors from modifying the system.
CWE-863Incorrect Authorization3,303The control requires correct implementation of authorization specifically tied to change operations.
CWE-269Improper Privilege Management2,936Restricting who can perform changes helps ensure privileges are managed properly rather than assigned broadly.
CWE-732Incorrect Permission Assignment for Critical Resource1,837Defining and enforcing access restrictions ensures correct permission assignments on resources that support changes.
CWE-285Improper Authorization1,252Requiring definition, approval, and enforcement of access rules for changes addresses improper authorization of modifications.
CWE-250Execution with Unnecessary Privileges311Limiting change access to only approved entities reduces the risk of unnecessary privileges being available for modifications.
CWE-15External Control of System or Configuration Setting60Restricting changes to system and configuration settings prevents external entities from controlling those settings without approval.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2024-575202.29.80.0352good
CVE-2024-392731.89.00.0031good
CVE-2016-200251.88.80.0003good
CVE-2021-478521.88.80.0003good
CVE-2025-416661.88.80.0118good
CVE-2026-19951.67.80.0001good
CVE-2026-335091.57.50.0010good
CVE-2026-35464 UPD1.57.50.0021good
CVE-2023-47179 UPD2.98.80.1915good
CVE-2026-350292.88.80.1767good
CVE-2026-228692.09.80.0019good
CVE-2024-396082.010.00.0026good
CVE-2025-110072.09.80.0028good
CVE-2026-35546 UPD2.09.80.0008good
CVE-2019-25568 UPD2.09.80.0003good
CVE-2026-62352.09.80.0003good
CVE-2026-42812 UPD2.09.90.0012partial
CVE-2016-200242.09.80.0003good
CVE-2026-31302.09.80.0002partial
CVE-2025-551412.08.80.0384good
CVE-2025-636901.99.10.0172good
CVE-2025-09281.98.80.0232good
CVE-2021-477701.88.80.0033good
CVE-2024-397881.89.10.0004good
CVE-2021-477351.88.80.0049good

Other controls in family CM

CM-1 CM-10 CM-11 CM-12 CM-13 CM-14 CM-2 CM-3 CM-4 CM-6 CM-7 CM-8 CM-9