Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SC

SC-5Denial-of-service Protection

{{ insert: param, sc-05_odp.02 }} the effects of the following types of denial-of-service events: {{ insert: param, sc-05_odp.01 }} ; and Employ the following controls to achieve the denial-of-service objective: {{ insert: param, sc-05_odp.03 }}.

Last updated: 19 May 2026 20:20 UTC

Implementations targeting this control (1)

ATT&CK techniques this control mitigates (1)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-400Uncontrolled Resource Consumption3,367Directly limits uncontrolled resource consumption that leads to denial-of-service.
CWE-770Allocation of Resources Without Limits or Throttling2,023Requires throttling and limits on resource allocation to prevent exhaustion.
CWE-835Loop with Unreachable Exit Condition ('Infinite Loop')936Detects and mitigates infinite loops that produce sustained resource consumption.
CWE-674Uncontrolled Recursion458Prevents uncontrolled recursion that exhausts stack or CPU resources.
CWE-407Inefficient Algorithmic Complexity87Addresses inefficient algorithms whose complexity can be exploited for DoS.
CWE-409Improper Handling of Highly Compressed Data (Data Amplification)52Limits effects of data amplification from compressed or malicious inputs.
CWE-405Asymmetric Resource Consumption (Amplification)42Employs controls that mitigate amplification attacks causing asymmetric resource use.
CWE-406Insufficient Control of Network Message Volume (Network Amplification)16Implements network message volume controls to block amplification DoS vectors.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2026-31283 UPD2.09.80.0006good
CVE-2024-127051.87.50.0562good
CVE-2025-583491.89.10.0006good
CVE-2024-28781.87.50.0462good
CVE-2024-373581.88.60.0076good
CVE-2025-552221.78.60.0008good
CVE-2025-268191.78.60.0012good
CVE-2025-234171.78.60.0008good
CVE-2025-552211.78.60.0008good
CVE-2024-488821.78.60.0008good
CVE-2024-125371.77.50.0267good
CVE-2026-261301.77.50.0363good
CVE-2025-302561.78.60.0013good
CVE-2026-340451.68.20.0008good
CVE-2026-35457 UPD1.68.20.0008good
CVE-2025-213891.67.50.0239good
CVE-2026-74021.68.10.0001good
CVE-2024-466681.67.50.0209good
CVE-2026-54401.67.50.0189good
CVE-2018-251081.67.50.0118good
CVE-2025-212891.67.50.0131good
CVE-2025-274191.67.50.0089good
CVE-2020-369071.67.50.0084good
CVE-2025-10591.57.50.0067good
CVE-2026-334831.57.50.0058good

Other controls in family SC

SC-1 SC-10 SC-11 SC-12 SC-13 SC-14 SC-15 SC-16 SC-17 SC-18 SC-19 SC-2 SC-20 SC-21 SC-22 SC-23 SC-24 SC-25 SC-26 SC-27 SC-28 SC-29 SC-3 SC-30 SC-31 SC-32 SC-33 SC-34 SC-35 SC-36 SC-37 SC-38 SC-39 SC-4 SC-40 SC-41 SC-42 SC-43 SC-44 SC-45 SC-46 SC-47 SC-48 SC-49 SC-50 SC-51 SC-6 SC-7 SC-8 SC-9