Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SC

SC-14Public Access Protections

Public Access Protections

Last updated: 19 May 2026 14:18 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (9)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,259Limits disclosure of sensitive information by ensuring only authorized actors can reach it through public interfaces.
CWE-862Missing Authorization8,796Forces explicit authorization enforcement before any public request can affect protected data or functions.
CWE-284Improper Access Control4,905Directly requires mechanisms to restrict public users from unauthorized actions on system resources.
CWE-863Incorrect Authorization3,303Addresses incorrect policy decisions that would otherwise allow public users to exceed intended privileges.
CWE-306Missing Authentication for Critical Function2,600Requires authentication gates on critical functions that must remain unavailable to anonymous public users.
CWE-732Incorrect Permission Assignment for Critical Resource1,837Requires correct permission settings on public-facing resources to block unauthorized read/write access.
CWE-285Improper Authorization1,252Mandates authorization checks so public access cannot perform disallowed operations or modifications.
CWE-668Exposure of Resource to Wrong Sphere788Enforces separation so resources are not placed in a public sphere without explicit protection.
CWE-552Files or Directories Accessible to External Parties551Prevents public exposure of files or directories that should not be reachable by unauthenticated parties.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-666032.09.80.0007good
CVE-2025-412402.010.00.0039good
CVE-2025-609491.89.10.0005good
CVE-2025-133711.78.60.0031good
CVE-2026-35408 UPD1.78.70.0001good
CVE-2026-30617 UPD1.78.60.0021good
CVE-2026-410551.78.60.0005good
CVE-2025-276151.68.20.0006good
CVE-2024-136221.57.50.0017good
CVE-2024-123151.57.50.0043good
CVE-2025-252811.57.50.0033good
CVE-2026-351851.57.50.0010good
CVE-2018-251641.57.50.0009good
CVE-2024-136411.25.90.0032good
CVE-2024-523671.15.30.0010good
CVE-2024-113964.35.30.5417good
CVE-2024-120083.15.30.3348good
CVE-2026-279442.39.80.0607good
CVE-2026-244772.27.50.1122good
CVE-2026-236932.010.00.0020good
CVE-2019-253372.09.80.0017good
CVE-2025-708412.010.00.0010good
CVE-2026-222372.09.80.0056good
CVE-2020-369232.09.80.0024good
CVE-2025-632232.09.80.0080good

Other controls in family SC

SC-1 SC-10 SC-11 SC-12 SC-13 SC-15 SC-16 SC-17 SC-18 SC-19 SC-2 SC-20 SC-21 SC-22 SC-23 SC-24 SC-25 SC-26 SC-27 SC-28 SC-29 SC-3 SC-30 SC-31 SC-32 SC-33 SC-34 SC-35 SC-36 SC-37 SC-38 SC-39 SC-4 SC-40 SC-41 SC-42 SC-43 SC-44 SC-45 SC-46 SC-47 SC-48 SC-49 SC-5 SC-50 SC-51 SC-6 SC-7 SC-8 SC-9