Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SR

SR-4Provenance

Document, monitor, and maintain valid provenance of the following systems, system components, and associated data: {{ insert: param, sr-04_odp }}.

Last updated: 19 May 2026 14:18 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (22)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-502Deserialization of Untrusted Data3,170Provenance of associated data allows detection of untrusted sources before deserialization or processing occurs.
CWE-345Insufficient Verification of Data Authenticity654Provenance documentation and monitoring directly enables verification of authenticity for components and data throughout their history.
CWE-829Inclusion of Functionality from Untrusted Control Sphere259Documenting component provenance ensures functionality is only included from verified, trusted control spheres rather than untrusted ones.
CWE-494Download of Code Without Integrity Check243Tracking provenance of components and code necessitates integrity verification, preventing downloads or inclusions without such checks.
CWE-506Embedded Malicious Code83Valid provenance monitoring makes insertion of embedded malicious code during supply chain or development stages detectable.
CWE-912Hidden Functionality79Provenance tracking of components reveals hidden functionality introduced via supply chain or build processes.
CWE-353Missing Support for Integrity Check37Maintaining valid provenance requires supporting integrity checks on the origin and chain of custody for systems and data.
CWE-1104Use of Unmaintained Third Party Components20Provenance records include supplier and lifecycle details, enabling ongoing monitoring to avoid unmaintained third-party components.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2026-285001.78.60.0001good
CVE-2026-352051.67.80.0002good
CVE-2025-30066 KEV9.28.60.9178good
CVE-2010-201037.19.80.8508good
CVE-2026-319762.09.80.0009good
CVE-2025-275100.40.00.0632good

Other controls in family SR

SR-1 SR-10 SR-11 SR-12 SR-2 SR-3 SR-5 SR-6 SR-7 SR-8 SR-9