1. Assessment Phase

  • NIST 800-53 Rev. 5 Compliance Assessment Execution
20 Credits

NIST 800-53 Rev. 5 Compliance Report

Overview

This report performs a technical assessment of your AWS environment against the security and privacy controls defined in NIST Special Publication 800-53 Revision 5. This standard provides a comprehensive catalog of safeguards for managing information security and privacy risk across federal information systems. It is a cornerstone for U.S. government compliance requirements such as FedRAMP, FISMA, and others.

This assessment evaluates your environment against the following NIST 800-53 control families:

Access Control (AC)

Covers account management, access enforcement, separation of duties, least privilege, remote access, access decisions, and information flow enforcement.

Audit and Accountability (AU)

Focuses on event logging, audit content and storage, audit review and analysis, non-repudiation, audit record generation, session audit, and cross-organizational logging.

Assessment, Authorization, and Monitoring (CA)

Includes control assessments, continuous monitoring, internal connections, and risk monitoring.

Configuration Management (CM)

Covers baseline configurations, configuration change control, access restrictions, system inventory, and configuration enforcement.

Contingency Planning (CP)

Addresses contingency plans, alternate storage and processing sites, system backups, and recovery capabilities.

Identification and Authentication (IA)

Focuses on user and device authentication, multi-factor authentication, password and identifier policies, and authenticator management.

Incident Response (IR)

Includes incident handling, response tracking, and automated response capabilities.

Maintenance (MA)

Covers nonlocal maintenance logging and secure maintenance processes.

Media Protection (MP)

Focuses on access controls for media.

Physical and Environmental Protection (PE)

Covers monitoring of physical access and physical controls.

Program Management (PM)

Includes security strategy, threat awareness, protection of CUI, and continuous monitoring strategies.

Risk Assessment (RA)

Covers risk assessments, vulnerability scanning, threat hunting, and predictive analytics.

System and Services Acquisition (SA)

Addresses secure development practices, external services, developer configuration management, and cryptographic key control.

System and Communications Protection (SC)

Covers boundary protection, denial of service protections, transmission integrity, cryptographic controls, session authenticity, and system isolation.

System and Information Integrity (SI)

Includes flaw remediation, malicious code protection, system monitoring, integrity validation, alerts and advisories, and de-identification.

The assessment covers many AWS services, including IAM, CloudTrail, S3, GuardDuty, and KMS.

Upon completion, you will receive a detailed report identifying all passed and failed resources, along with actionable remediation steps to help you meet the NIST 800-53 Rev. 5 compliance requirements.