Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SA

SA-16Developer-provided Training

Require the developer of the system, system component, or system service to provide the following training on the correct use and operation of the implemented security and privacy functions, controls, and/or mechanisms: {{ insert: param, sa-16_odp }}.

Last updated: 19 May 2026 14:18 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (3)

Weaknesses this control addresses (9)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,905Explicit training on access control mechanisms and their operation makes improper access control harder to introduce via misconfiguration.
CWE-287Improper Authentication4,757Developer-provided instruction on authentication controls improves correct implementation and ongoing operation of authentication.
CWE-269Improper Privilege Management2,936Developer training on implemented privilege management controls prevents improper assignment or escalation through correct configuration and operation.
CWE-306Missing Authentication for Critical Function2,600Training emphasizes enabling and properly using authentication for critical functions, reducing missing authentication exposures.
CWE-732Incorrect Permission Assignment for Critical Resource1,837Training on security functions includes correct permission assignment for critical resources, lowering misconfiguration risk.
CWE-276Incorrect Default Permissions1,765Training covers proper setting of permissions on resources, reducing incorrect default or inherited permissions after deployment.
CWE-285Improper Authorization1,252Training on authorization functions and controls reduces authorization bypasses stemming from incorrect setup or use.
CWE-250Execution with Unnecessary Privileges311Training on correct operation of privilege-related security functions directly reduces unnecessary privilege execution by teaching least-privilege usage.
CWE-1188Initialization of a Resource with an Insecure Default309Instruction on secure initialization of security controls prevents leaving resources with insecure defaults after installation.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family SA

SA-1 SA-10 SA-11 SA-12 SA-13 SA-14 SA-15 SA-17 SA-18 SA-19 SA-2 SA-20 SA-21 SA-22 SA-23 SA-24 SA-3 SA-4 SA-5 SA-6 SA-7 SA-8 SA-9