NIST SP 800-53 (Rev.5)


Description
Recommended Security Controls for Federal Information Systems and Organizations. (Rev.5)
Owning organization
Validating JSON schema
Creator
License
Creative Commons Zero v1.0 Universal

Definition of the object
{
    "label": "NIST SP 800-53",
    "language": "EN",
    "measures": [
        {
            "category": "Access Control",
            "code": "AC-1",
            "label": "Access Control Policy and Procedures",
            "uuid": "ebf10522-0f57-4880-aa73-e28a206b7be4"
        },
        {
            "category": "Access Control",
            "code": "AC-2",
            "label": "Account Management",
            "uuid": "8245e3a6-09ee-488a-880f-8d1b811b2091"
        },
        {
            "category": "Access Control",
            "code": "AC-3",
            "label": "Access Enforcement",
            "uuid": "f3cc0b06-2294-49fe-aca4-3eb929cc87eb"
        },
        {
            "category": "Access Control",
            "code": "AC-4",
            "label": "Information Flow Enforcement",
            "uuid": "e2323e31-d4c5-4f58-8de3-529d41c7fde6"
        },
        {
            "category": "Access Control",
            "code": "AC-5",
            "label": "Separation of Duties",
            "uuid": "35f0172f-4770-4f69-9aa7-8b48a880c85a"
        },
        {
            "category": "Access Control",
            "code": "AC-6",
            "label": "Least Privilege",
            "uuid": "cea02331-b15a-42bb-ae5c-826afb449240"
        },
        {
            "category": "Access Control",
            "code": "AC-7",
            "label": "Unsuccessful Logon Attempts",
            "uuid": "f8e45f26-413c-4c61-be2c-216ec688ecb1"
        },
        {
            "category": "Access Control",
            "code": "AC-8",
            "label": "System Use Notification",
            "uuid": "2006d82c-a148-470f-ad3d-339980bb69b9"
        },
        {
            "category": "Access Control",
            "code": "AC-9",
            "label": "Previous Logon (Access) Notification",
            "uuid": "a06fe04e-e834-42c9-8b4f-d998eb493136"
        },
        {
            "category": "Access Control",
            "code": "AC-10",
            "label": "Concurrent Session Control",
            "uuid": "2feed753-8333-46b9-b4a0-ffd78e6d5f96"
        },
        {
            "category": "Access Control",
            "code": "AC-11",
            "label": "Device Lock",
            "uuid": "48e9827d-60b5-4637-89fa-45dfb4231ff7"
        },
        {
            "category": "Access Control",
            "code": "AC-12",
            "label": "Session Termination",
            "uuid": "db302cfa-325b-4d4d-a6b3-f85618ca4eb6"
        },
        {
            "category": "Access Control",
            "code": "AC-14",
            "label": "Permitted Actions without Identification or Authentication",
            "uuid": "90b4a207-023d-4ac4-a1dd-c5ca32453de2"
        },
        {
            "category": "Access Control",
            "code": "AC-16",
            "label": "Security and Privacy Attributes",
            "uuid": "33d42330-bde6-4964-82c9-fd2eaa07792d"
        },
        {
            "category": "Access Control",
            "code": "AC-17",
            "label": "Remote Access",
            "uuid": "1b2e1483-0a0e-4c84-ad44-42db07d6172f"
        },
        {
            "category": "Access Control",
            "code": "AC-18",
            "label": "Wireless Access",
            "uuid": "5dad70d6-04e6-4ad0-9c32-c565e40329ad"
        },
        {
            "category": "Access Control",
            "code": "AC-19",
            "label": "Access Control for Mobile Devices",
            "uuid": "250001c2-f02d-496c-917e-70034724bfd6"
        },
        {
            "category": "Access Control",
            "code": "AC-20",
            "label": "Use of External Systems",
            "uuid": "fc9d8985-7dea-4b78-b977-7c5ac82e15f2"
        },
        {
            "category": "Access Control",
            "code": "AC-21",
            "label": "Information Sharing",
            "uuid": "5d4dc43c-9c46-4fc5-969b-02a1421acf42"
        },
        {
            "category": "Access Control",
            "code": "AC-22",
            "label": "Publicly Accessible Content",
            "uuid": "81cc10c0-de1e-4317-aae9-304a4c45151e"
        },
        {
            "category": "Access Control",
            "code": "AC-23",
            "label": "Data Mining Protection",
            "uuid": "ccd5e72f-92d7-4824-8caa-9a75209849d2"
        },
        {
            "category": "Access Control",
            "code": "AC-24",
            "label": "Access Control Decisions",
            "uuid": "5493d4a2-bae6-4bdf-ba84-79bbae4fb53b"
        },
        {
            "category": "Access Control",
            "code": "AC-25",
            "label": "Reference Monitor",
            "uuid": "6922787a-2fcb-4cfe-a3bc-a75e7c49fccd"
        },
        {
            "category": "Awareness And Training",
            "code": "AT-1",
            "label": "Awareness and Training Policy and Procedures",
            "uuid": "468658d8-61b8-4757-8c28-d6017337ea91"
        },
        {
            "category": "Awareness And Training",
            "code": "AT-2",
            "label": "Awareness Training",
            "uuid": "3f956648-f1a8-4c8f-9e4b-11e4da8afc6a"
        },
        {
            "category": "Awareness And Training",
            "code": "AT-3",
            "label": "Role-Based Training",
            "uuid": "64694da5-0ca9-44f6-bd94-0dc1fa8f69ea"
        },
        {
            "category": "Awareness And Training",
            "code": "AT-4",
            "label": "Training Records",
            "uuid": "a32e8643-88b7-4fa6-9a25-f67b9236b9d0"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-1",
            "label": "Audit and Accountability Policy and Procedures",
            "uuid": "0de44076-cd30-439a-9375-c7c6692da6b2"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-2",
            "label": "Audit Events",
            "uuid": "8b250e6b-4463-4d55-9241-c99db31a838c"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-3",
            "label": "Content of Audit Records",
            "uuid": "aefeafa5-2f92-4a78-a149-6b00f8a0f9f1"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-4",
            "label": "Audit Storage Capacity",
            "uuid": "6145995f-74e1-4479-ba93-c1cdd9e34f8c"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-5",
            "label": "Response to Audit Processing Failures",
            "uuid": "bcc90c0a-8c92-4e75-ba67-a9dd2a64ca9d"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-6",
            "label": "Audit Review, Analysis, and Reporting",
            "uuid": "cb39be02-c637-4984-ad59-ad1b5afd7609"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-7",
            "label": "Audit Reduction and Report Generation",
            "uuid": "8314aca6-82c0-4955-a6d3-78f41146ef15"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-8",
            "label": "Time Stamps",
            "uuid": "b9383590-e160-4840-b6e7-9476aeb6b8c0"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-9",
            "label": "Protection of Audit Information",
            "uuid": "aff838cd-5392-4620-be39-87c4ae7b6d33"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-10",
            "label": "Non-repudiation",
            "uuid": "52e68421-ebcf-453f-8e42-48813d47dcf6"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-11",
            "label": "Audit Record Retention",
            "uuid": "30ccd853-e570-4c61-98d0-4837692d0654"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-12",
            "label": "Audit Generation",
            "uuid": "67e16eb6-14cb-41a4-aea0-8f0dc7ed1023"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-13",
            "label": "Monitoring for Information Disclosure",
            "uuid": "ca6dc3b4-45ad-4a17-84c2-06fe7de2936e"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-14",
            "label": "Session Audit",
            "uuid": "d447bf80-7c6e-4e16-9f69-a15ed7eafd92"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-15",
            "label": "Alternate Audit Capability",
            "uuid": "43d6e18f-7d4e-43f5-af7f-ea6d07d37299"
        },
        {
            "category": "Audit And Accountability",
            "code": "AU-16",
            "label": "Cross-Organizational Auditing",
            "uuid": "e499f145-1fad-49e2-9403-f50a2a9801e8"
        },
        {
            "category": "Security Assessment And Authorization",
            "code": "CA-1",
            "label": "Assessment, Authorization, and Monitoring Policies and Procedures",
            "uuid": "9bc48f7a-6863-421d-96c5-7e7099ef2415"
        },
        {
            "category": "Security Assessment And Authorization",
            "code": "CA-2",
            "label": "Assessments",
            "uuid": "1efbb7bc-a9df-41b0-af65-c8c7cc593246"
        },
        {
            "category": "Security Assessment And Authorization",
            "code": "CA-3",
            "label": "System Interconnections",
            "uuid": "6c55f12d-0f58-4caf-9c27-91c38d3620e3"
        },
        {
            "category": "Security Assessment And Authorization",
            "code": "CA-5",
            "label": "Plan of Action and Milestones",
            "uuid": "0af9100d-df42-4d7e-953d-8c1fd56dff85"
        },
        {
            "category": "Security Assessment And Authorization",
            "code": "CA-6",
            "label": "Authorization",
            "uuid": "de31dbbb-4981-4815-acfa-8375989d98cd"
        },
        {
            "category": "Security Assessment And Authorization",
            "code": "CA-7",
            "label": "Continuous Monitoring",
            "uuid": "5264169d-4e61-40b7-800e-1998f41af781"
        },
        {
            "category": "Security Assessment And Authorization",
            "code": "CA-8",
            "label": "Penetration Testing",
            "uuid": "2080500f-047a-4695-841f-326310fd6a79"
        },
        {
            "category": "Security Assessment And Authorization",
            "code": "CA-9",
            "label": "Internal System Connections",
            "uuid": "063f894b-5f12-4e99-8277-6e21692c977d"
        },
        {
            "category": "Configuration Management",
            "code": "CM-1",
            "label": "Configuration Management Policy and Procedures",
            "uuid": "698ebcc9-cf38-49d4-9a7a-dce61bbff968"
        },
        {
            "category": "Configuration Management",
            "code": "CM-2",
            "label": "Baseline Configuration",
            "uuid": "3b076d55-a168-4e4e-ba44-cac820929399"
        },
        {
            "category": "Configuration Management",
            "code": "CM-3",
            "label": "Configuration Change Control",
            "uuid": "27086d2c-4ed0-4163-89c3-d280559102ea"
        },
        {
            "category": "Configuration Management",
            "code": "CM-4",
            "label": "Security and Privacy Impact Analyses",
            "uuid": "4d738f6e-3999-4a07-97f8-552ef2df77f3"
        },
        {
            "category": "Configuration Management",
            "code": "CM-5",
            "label": "Access Restrictions for Change",
            "uuid": "dce2b6b6-33dd-45b1-9006-e09493aa95e3"
        },
        {
            "category": "Configuration Management",
            "code": "CM-6",
            "label": "Configuration Settings",
            "uuid": "dfeeec44-4cd4-49f8-8a41-2c03f786f818"
        },
        {
            "category": "Configuration Management",
            "code": "CM-7",
            "label": "Least Functionality",
            "uuid": "d0557646-d1eb-4d79-8670-b1cdaf1072be"
        },
        {
            "category": "Configuration Management",
            "code": "CM-8",
            "label": "System Component Inventory",
            "uuid": "36ae972c-4543-4548-8946-47cb651ed0ef"
        },
        {
            "category": "Configuration Management",
            "code": "CM-9",
            "label": "Configuration Management Plan",
            "uuid": "b53a00fb-054c-4f9e-8aff-69ad91c1dcb8"
        },
        {
            "category": "Configuration Management",
            "code": "CM-10",
            "label": "Software Usage Restrictions",
            "uuid": "8ccaf96b-99b1-4677-be72-1e072cc26ebd"
        },
        {
            "category": "Configuration Management",
            "code": "CM-11",
            "label": "User-Installed Software",
            "uuid": "0e0864af-bd66-4012-b7ea-75ee7a57ef0b"
        },
        {
            "category": "Configuration Management",
            "code": "CM-12",
            "label": "Information Location",
            "uuid": "50310b7b-0a4b-4572-998c-5954f7d6750e"
        },
        {
            "category": "Contingency Planning",
            "code": "CP-1",
            "label": "Contingency Planning Policy and Procedures",
            "uuid": "c1aa25a1-a0cf-483d-8b7d-44725cd3f6ed"
        },
        {
            "category": "Contingency Planning",
            "code": "CP-2",
            "label": "Contingency Plan",
            "uuid": "4f08538a-9f7d-422f-aaae-0949bf39c028"
        },
        {
            "category": "Contingency Planning",
            "code": "CP-3",
            "label": "Contingency Training",
            "uuid": "a3a1db7e-c1e1-409d-aa9a-e4b4ca925be6"
        },
        {
            "category": "Contingency Planning",
            "code": "CP-4",
            "label": "Contingency Plan Testing",
            "uuid": "4c98569b-ec41-4758-b8a3-5bd75b56d38b"
        },
        {
            "category": "Contingency Planning",
            "code": "CP-6",
            "label": "Alternate Storage Site",
            "uuid": "60a84903-025a-40c5-9cf6-dad960e55cf1"
        },
        {
            "category": "Contingency Planning",
            "code": "CP-7",
            "label": "Alternate Processing Site",
            "uuid": "1dfd046a-a422-4089-9fda-c141e865042a"
        },
        {
            "category": "Contingency Planning",
            "code": "CP-8",
            "label": "Telecommunications Services",
            "uuid": "01096bf7-a45e-40d9-851e-72a6b8d7344a"
        },
        {
            "category": "Contingency Planning",
            "code": "CP-9",
            "label": "System Backup",
            "uuid": "5cdd85f2-15b0-4c61-b3d4-66f4ba9114c8"
        },
        {
            "category": "Contingency Planning",
            "code": "CP-10",
            "label": "System Recovery and Reconstitution",
            "uuid": "5ba61017-362e-411b-929d-c76c27358660"
        },
        {
            "category": "Contingency Planning",
            "code": "CP-11",
            "label": "Alternate Communications Protocols",
            "uuid": "b705c1c5-aee2-4cb0-9f55-f045fc627f34"
        },
        {
            "category": "Contingency Planning",
            "code": "CP-12",
            "label": "Safe Mode",
            "uuid": "b827b7db-76ee-4fda-b193-3004feef59e0"
        },
        {
            "category": "Contingency Planning",
            "code": "CP-13",
            "label": "Alternative Security Mechanisms",
            "uuid": "5278ff6f-473b-4a2c-8234-1a6a3198c701"
        },
        {
            "category": "Identification And Authentication",
            "code": "IA-1",
            "label": "Identification and Authentication Policy and Procedures",
            "uuid": "99e77822-723b-4a08-8ee0-4c73ad494db7"
        },
        {
            "category": "Identification And Authentication",
            "code": "IA-2",
            "label": "Identification and Authentication (Organizational Users)",
            "uuid": "b82eba2f-bbf7-4390-aa9e-e35ccae691ba"
        },
        {
            "category": "Identification And Authentication",
            "code": "IA-3",
            "label": "Device Identification and Authentication",
            "uuid": "e37e0d76-3ea8-49e4-b65b-a5e2645a902a"
        },
        {
            "category": "Identification And Authentication",
            "code": "IA-4",
            "label": "Identifier Management",
            "uuid": "23ab9d48-396c-4f20-9344-e6a6bd2439a2"
        },
        {
            "category": "Identification And Authentication",
            "code": "IA-5",
            "label": "Authenticator Management",
            "uuid": "d0c5fc8d-1e95-4e70-bdfd-f31d368af8f0"
        },
        {
            "category": "Identification And Authentication",
            "code": "IA-6",
            "label": "Authenticator Feedback",
            "uuid": "1bf6a2b8-b728-49a2-953f-0a965d966db1"
        },
        {
            "category": "Identification And Authentication",
            "code": "IA-7",
            "label": "Cryptographic Module Authentication",
            "uuid": "7c68c0c2-fea5-44d1-8580-5170edd92e22"
        },
        {
            "category": "Identification And Authentication",
            "code": "IA-8",
            "label": "Identification and Authentication (Non-Organizational Users)",
            "uuid": "df6812ce-357b-44ae-8979-a663a85fa687"
        },
        {
            "category": "Identification And Authentication",
            "code": "IA-9",
            "label": "Service Identification and Authentication",
            "uuid": "17a82de8-0490-4100-a4fb-2ad9af49d594"
        },
        {
            "category": "Identification And Authentication",
            "code": "IA-10",
            "label": "Adaptive Authentication",
            "uuid": "f0b81b68-372d-4ced-9c6b-7d8ae3da799c"
        },
        {
            "category": "Identification And Authentication",
            "code": "IA-11",
            "label": "Re-authentication",
            "uuid": "625e343d-7aa1-46e1-939b-50f5b8f5f5b4"
        },
        {
            "category": "Identification And Authentication",
            "code": "IA-12",
            "label": "Identity Proofing",
            "uuid": "c183aff2-8e42-439c-9392-d6823321ec9e"
        },
        {
            "category": "Individual Participation",
            "code": "IP-1",
            "label": "Individual Participation Policy and Procedures",
            "uuid": "b41dacdb-78d6-4744-bcae-5a46b95cfe04"
        },
        {
            "category": "Individual Participation",
            "code": "IP-2",
            "label": "Consent",
            "uuid": "4123ace0-da01-431c-997c-bd03e3319f36"
        },
        {
            "category": "Individual Participation",
            "code": "IP-3",
            "label": "Redress",
            "uuid": "72eed0db-aa5a-4677-899f-b56d01187c6e"
        },
        {
            "category": "Individual Participation",
            "code": "IP-4",
            "label": "Privacy Notice",
            "uuid": "d351c523-45f7-405c-aa9e-eb4289dea021"
        },
        {
            "category": "Individual Participation",
            "code": "IP-5",
            "label": "Privacy Act Statement",
            "uuid": "90b76f4c-10ec-4530-a7c8-b3d488d8886d"
        },
        {
            "category": "Individual Participation",
            "code": "IP-6",
            "label": "Individual Access",
            "uuid": "67e6c588-aea1-47c7-a34e-e04bf91df582"
        },
        {
            "category": "Incident Response",
            "code": "IR-1",
            "label": "Incident Response Policy and Procedures",
            "uuid": "74b14d2d-6320-4ac9-9b74-d93177dd4329"
        },
        {
            "category": "Incident Response",
            "code": "IR-2",
            "label": "Incident Response Training",
            "uuid": "1476a1d4-f1f5-42ae-93a6-1227a89cb3e3"
        },
        {
            "category": "Incident Response",
            "code": "IR-3",
            "label": "Incident Response Testing",
            "uuid": "e8449cab-54ae-4bd4-8b6e-de2820e8ec4b"
        },
        {
            "category": "Incident Response",
            "code": "IR-4",
            "label": "Incident Handling",
            "uuid": "3e0e9ea8-db9d-4825-b76a-17859f2f8e67"
        },
        {
            "category": "Incident Response",
            "code": "IR-5",
            "label": "Incident Monitoring",
            "uuid": "10213f53-5179-42f2-beb6-1364872d983d"
        },
        {
            "category": "Incident Response",
            "code": "IR-6",
            "label": "Incident Reporting",
            "uuid": "69e93c59-0239-4bc8-8d5f-d2c65c706f46"
        },
        {
            "category": "Incident Response",
            "code": "IR-7",
            "label": "Incident Response Assistance",
            "uuid": "54802539-1d62-43c3-8f7e-8c7e03087812"
        },
        {
            "category": "Incident Response",
            "code": "IR-8",
            "label": "Incident Response Plan",
            "uuid": "c2260bd5-161f-4fb9-8496-0de50c2c3440"
        },
        {
            "category": "Incident Response",
            "code": "IR-9",
            "label": "Information Spillage Response",
            "uuid": "e1211579-cdf4-4357-ba8a-3a5c46401837"
        },
        {
            "category": "Incident Response",
            "code": "IR-10",
            "label": "Integrated Information Security Analysis Team",
            "uuid": "a781d945-be41-4457-aef9-5f1757031940"
        },
        {
            "category": "Maintenance",
            "code": "MA-1",
            "label": "System Maintenance Policy and Procedures",
            "uuid": "7fb408ab-f358-489d-be81-5b9395da78a7"
        },
        {
            "category": "Maintenance",
            "code": "MA-2",
            "label": "Controlled Maintenance",
            "uuid": "9d4a3657-457f-4223-adfe-d0b2df91ffc3"
        },
        {
            "category": "Maintenance",
            "code": "MA-3",
            "label": "Maintenance Tools",
            "uuid": "508b0a74-cd81-4a65-b2c1-bb4c193adc53"
        },
        {
            "category": "Maintenance",
            "code": "MA-4",
            "label": "Nonlocal Maintenance",
            "uuid": "a8768b25-29ff-4b0a-a61e-89a2dacb2ff8"
        },
        {
            "category": "Maintenance",
            "code": "MA-5",
            "label": "Maintenance Personnel",
            "uuid": "be8d5a19-945d-4b26-9499-790193e65b06"
        },
        {
            "category": "Maintenance",
            "code": "MA-6",
            "label": "Timely Maintenance",
            "uuid": "9368a916-1fac-4dd2-b621-751ef4483a72"
        },
        {
            "category": "Media Protection",
            "code": "MP-1",
            "label": "Media Protection Policy and Procedures",
            "uuid": "bcc51690-d12c-41a8-bd76-6aae187a8afc"
        },
        {
            "category": "Media Protection",
            "code": "MP-2",
            "label": "Media Access",
            "uuid": "14555491-0f15-428b-9ecd-836c6307675c"
        },
        {
            "category": "Media Protection",
            "code": "MP-3",
            "label": "Media Marking",
            "uuid": "70ccf1af-4cad-443a-9dcd-9b49c4b6aec8"
        },
        {
            "category": "Media Protection",
            "code": "MP-4",
            "label": "Media Storage",
            "uuid": "50272033-eb78-4309-84e0-303320d75b87"
        },
        {
            "category": "Media Protection",
            "code": "MP-5",
            "label": "Media Transport",
            "uuid": "025d84e9-5612-404e-acf4-5d860c01a73c"
        },
        {
            "category": "Media Protection",
            "code": "MP-6",
            "label": "Media Sanitization",
            "uuid": "b0779c7f-7db2-4af2-ab93-5c000a889408"
        },
        {
            "category": "Media Protection",
            "code": "MP-7",
            "label": "Media Use",
            "uuid": "cc087e48-874b-4953-adcc-96fac3f19306"
        },
        {
            "category": "Media Protection",
            "code": "MP-8",
            "label": "Media Downgrading",
            "uuid": "b6ed1637-26e3-4278-9552-89601f278d8c"
        },
        {
            "category": "Privacy Authorization",
            "code": "PA-1",
            "label": "Privacy Authorization Policy and Procedures",
            "uuid": "5b92c7ee-202b-4de8-983c-74937b86b48f"
        },
        {
            "category": "Privacy Authorization",
            "code": "PA-2",
            "label": "Authority to Collect",
            "uuid": "ee9525ea-a06f-4862-b6c8-c09fa266ea38"
        },
        {
            "category": "Privacy Authorization",
            "code": "PA-3",
            "label": "Purpose Specification",
            "uuid": "dc814dd1-359d-4245-839c-5a1cdd6e1bad"
        },
        {
            "category": "Privacy Authorization",
            "code": "PA-4",
            "label": "Information Sharing With External Parties",
            "uuid": "f7c64768-dc70-4e4d-b121-58f41bfde7c6"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-1",
            "label": "Physical and Environmental Protection Policy and Procedures",
            "uuid": "c1738677-3cae-4833-97b4-f2f3c04dd5e0"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-2",
            "label": "Physical Access Authorizations",
            "uuid": "e3d43ffd-1286-42c0-98fa-0e2e75d233e7"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-3",
            "label": "Physical Access Control",
            "uuid": "06679cfa-1bfd-436a-b99d-698fb275dfdb"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-4",
            "label": "Access Control for Transmission",
            "uuid": "f1dc5cba-17a8-4bee-aad0-d6b0ca84124d"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-5",
            "label": "Access Control for Output Devices",
            "uuid": "e8ed7158-ffc1-44a4-8673-80286ad97b36"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-6",
            "label": "Monitoring Physical Access",
            "uuid": "e48c2a77-93da-4afb-bde7-7bd957196286"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-8",
            "label": "Visitor Access Records",
            "uuid": "b3ee40ae-b296-4e88-9033-cb669e98f11c"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-9",
            "label": "Power Equipment and Cabling",
            "uuid": "7c9127dc-e0e8-4a6f-9cf9-82f5a7b18f37"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-10",
            "label": "Emergency Shutoff",
            "uuid": "990ee3a7-3044-4c8f-8387-946a7a9aba76"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-11",
            "label": "Emergency Power",
            "uuid": "6d3fbb99-fa7d-4c65-9c5f-928044a5840f"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-12",
            "label": "Emergency Lighting",
            "uuid": "5cf67afa-7a43-4dd4-b1db-dd28862a689c"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-13",
            "label": "Fire Protection",
            "uuid": "51e4fd6c-0aa8-4604-b13d-bf74c9706922"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-14",
            "label": "Temperature and Humidity Controls",
            "uuid": "9dda0a30-be3d-4752-867d-bf9570971c52"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-15",
            "label": "Water Damage Protection",
            "uuid": "6448f036-bdb2-4f21-8e30-0acf8073215d"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-16",
            "label": "Delivery and Removal",
            "uuid": "de6195c6-1fc1-423a-a748-785653c9324f"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-17",
            "label": "Alternate Work Site",
            "uuid": "aead24db-a196-4daf-a099-60b1d1991d70"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-18",
            "label": "Location of System Components",
            "uuid": "53ae3aa9-d88e-4f55-a040-375cfe348c48"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-19",
            "label": "Information Leakage",
            "uuid": "244cbc08-55d5-46ea-ba28-aec72f16b337"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-20",
            "label": "Asset Monitoring and Tracking",
            "uuid": "2fd70998-9247-4efd-923d-276f5c76b3b9"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-21",
            "label": "Electromagnetic Pulse Protection",
            "uuid": "b3523d09-add6-4b33-aa3e-6f780d83a9d6"
        },
        {
            "category": "Physical And Environmental Protection",
            "code": "PE-22",
            "label": "Component Marking",
            "uuid": "cd7d903b-0282-4895-8501-47b568183e97"
        },
        {
            "category": "Planning",
            "code": "PL-1",
            "label": "Planning Policy and Procedures",
            "uuid": "3c492512-da9f-4112-a76a-3e5cb0400e6f"
        },
        {
            "category": "Planning",
            "code": "PL-2",
            "label": "Security and Privacy Plans",
            "uuid": "8047a1c6-e890-4817-982d-04fcdc2820a2"
        },
        {
            "category": "Planning",
            "code": "PL-4",
            "label": "Rules of Behavior",
            "uuid": "7b481f8c-2485-40a8-aee7-03b39721e103"
        },
        {
            "category": "Planning",
            "code": "PL-7",
            "label": "Concept of Operations",
            "uuid": "7f388f12-77ec-47bf-b816-79cb42086b09"
        },
        {
            "category": "Planning",
            "code": "PL-8",
            "label": "Security and Privacy Architectures",
            "uuid": "3bffd1eb-e6a7-47ad-927a-0d679048ed5a"
        },
        {
            "category": "Planning",
            "code": "PL-9",
            "label": "Central Management",
            "uuid": "5b9bdfcc-3150-4c4a-8b08-386d9a829585"
        },
        {
            "category": "Planning",
            "code": "PL-10",
            "label": "Baseline Selection",
            "uuid": "5df5007e-c8cd-4cc8-845b-0d0bb0daf66f"
        },
        {
            "category": "Planning",
            "code": "PL-11",
            "label": "Baseline Tailoring",
            "uuid": "828560f0-7ac9-4960-aed9-6d618173a663"
        },
        {
            "category": "Program Management",
            "code": "PM-1",
            "label": "Information Security Program Plan",
            "uuid": "3ceb9dfc-c9e2-4cb6-830d-8170d53d5b05"
        },
        {
            "category": "Program Management",
            "code": "PM-2",
            "label": "Information Security Program Roles",
            "uuid": "293ebc1c-0452-41f8-ab14-101846241a47"
        },
        {
            "category": "Program Management",
            "code": "PM-3",
            "label": "Information Security and Privacy Resources",
            "uuid": "898d7024-6d3f-4d9a-868f-34ea1e451801"
        },
        {
            "category": "Program Management",
            "code": "PM-4",
            "label": "Plan of Action and Milestones Process",
            "uuid": "08327040-541f-40b4-a1cc-815d9298afe0"
        },
        {
            "category": "Program Management",
            "code": "PM-5",
            "label": "System Inventory",
            "uuid": "515fb4c4-2a45-47b7-9a7a-5878f1bbad9c"
        },
        {
            "category": "Program Management",
            "code": "PM-6",
            "label": "Measures of Performance",
            "uuid": "d5a60a37-684d-4b4b-b8a2-7d03814ff70d"
        },
        {
            "category": "Program Management",
            "code": "PM-7",
            "label": "Enterprise Architecture",
            "uuid": "ecefd9da-a07c-41c2-9397-017e878bdb67"
        },
        {
            "category": "Program Management",
            "code": "PM-8",
            "label": "Critical Infrastructure Plan",
            "uuid": "2d2a7dc6-2770-4897-ac0b-492e7ddd24ed"
        },
        {
            "category": "Program Management",
            "code": "PM-9",
            "label": "Risk Management Strategy",
            "uuid": "44b2a62a-6bc7-4474-b618-f1bc15e9798f"
        },
        {
            "category": "Program Management",
            "code": "PM-10",
            "label": "Authorization Process",
            "uuid": "ec1457b8-d116-45a4-8c61-5b8ddba8a2b9"
        },
        {
            "category": "Program Management",
            "code": "PM-11",
            "label": "Mission and Business Process Definition",
            "uuid": "9a4b8ede-d722-44b8-a04f-ae78cbd266ab"
        },
        {
            "category": "Program Management",
            "code": "PM-12",
            "label": "Insider Threat Program",
            "uuid": "9a9f32cf-d951-4909-98fe-c6a936af3913"
        },
        {
            "category": "Program Management",
            "code": "PM-13",
            "label": "Security and Privacy Workforce",
            "uuid": "b395f91d-24a4-4720-8534-3b491bb41002"
        },
        {
            "category": "Program Management",
            "code": "PM-14",
            "label": "Testing, Training, and Monitoring",
            "uuid": "8ff7acc4-c71b-4e1d-89f3-0c7db4a5055f"
        },
        {
            "category": "Program Management",
            "code": "PM-15",
            "label": "Contacts with Groups and Associations",
            "uuid": "e1219fd8-9db2-4297-99da-63be2b433aa8"
        },
        {
            "category": "Program Management",
            "code": "PM-16",
            "label": "Threat Awareness Program",
            "uuid": "9dd48833-5045-4e37-aa9a-2b69ee11739d"
        },
        {
            "category": "Program Management",
            "code": "PM-17",
            "label": "Protecting Controlled Unclassified Information on External Systems",
            "uuid": "e25168b6-fb5b-4ae7-a14c-6afc86246348"
        },
        {
            "category": "Program Management",
            "code": "PM-18",
            "label": "Privacy Program Plan",
            "uuid": "ab16520f-0c45-404d-8852-df2722a96412"
        },
        {
            "category": "Program Management",
            "code": "PM-19",
            "label": "Privacy Program Roles",
            "uuid": "8e3958aa-59c3-4c3e-9cf0-1283d783ec46"
        },
        {
            "category": "Program Management",
            "code": "PM-20",
            "label": "System of Records Notice",
            "uuid": "3585bbce-5c3b-4a2a-8a53-5c4af9467365"
        },
        {
            "category": "Program Management",
            "code": "PM-21",
            "label": "Dissemination of Privacy Program Information",
            "uuid": "41ad2d98-3dc5-4167-a8cf-869b3b53c495"
        },
        {
            "category": "Program Management",
            "code": "PM-22",
            "label": "Accounting of Disclosures",
            "uuid": "d7d3d288-cd67-40ea-871a-4aa256262dbf"
        },
        {
            "category": "Program Management",
            "code": "PM-23",
            "label": "Data Quality Management",
            "uuid": "a43a957c-c1ce-462f-87b8-bcb962a26991"
        },
        {
            "category": "Program Management",
            "code": "PM-24",
            "label": "Data Management Board",
            "uuid": "9c603ddb-5850-42a9-85bd-641667182bed"
        },
        {
            "category": "Program Management",
            "code": "PM-25",
            "label": "Data Integrity Board",
            "uuid": "54ca56bb-3a0e-47b9-8cdb-b28976481e54"
        },
        {
            "category": "Program Management",
            "code": "PM-26",
            "label": "Minimization of Personally Identifiable Information",
            "uuid": "e2aa9575-d1f9-440c-a3ae-72f79489dd3c"
        },
        {
            "category": "Program Management",
            "code": "PM-27",
            "label": "Individual Access Control",
            "uuid": "ce8a976a-536a-44ea-bb8b-bcf28a6931c8"
        },
        {
            "category": "Program Management",
            "code": "PM-28",
            "label": "Complaint Management",
            "uuid": "15f0293a-cef3-4c58-a6cf-725f0ea044c5"
        },
        {
            "category": "Program Management",
            "code": "PM-29",
            "label": "Inventory of Personally Identifiable Information",
            "uuid": "7f02ee88-5118-467b-bffc-c6176276db0a"
        },
        {
            "category": "Program Management",
            "code": "PM-30",
            "label": "Privacy Reporting",
            "uuid": "a6ae4db0-5f77-4e60-ae47-fa721623bcdb"
        },
        {
            "category": "Program Management",
            "code": "PM-31",
            "label": "Supply Chain Risk Management Plan",
            "uuid": "da890a6a-f2be-44f2-b3f2-4ac8e84cd66a"
        },
        {
            "category": "Program Management",
            "code": "PM-32",
            "label": "Risk Framing",
            "uuid": "2c4575a5-0d0a-40f7-8b8f-8a1c1a67b1e4"
        },
        {
            "category": "Personnel Security",
            "code": "PS-1",
            "label": "Personnel Security Policy and Procedures",
            "uuid": "3e6cdfcd-14f3-4b34-a6d4-62d677332806"
        },
        {
            "category": "Personnel Security",
            "code": "PS-2",
            "label": "Position Risk Designation",
            "uuid": "fd87a967-2217-418d-8378-b0773b7ca356"
        },
        {
            "category": "Personnel Security",
            "code": "PS-3",
            "label": "Personnel Screening",
            "uuid": "22faa4a0-2027-4150-8176-c77e84e3f03d"
        },
        {
            "category": "Personnel Security",
            "code": "PS-4",
            "label": "Personnel Termination",
            "uuid": "4d28a85e-20d2-4186-995e-de48a90eebb4"
        },
        {
            "category": "Personnel Security",
            "code": "PS-5",
            "label": "Personnel Transfer",
            "uuid": "db5781c8-b759-47de-9862-27b2d3c2b568"
        },
        {
            "category": "Personnel Security",
            "code": "PS-6",
            "label": "Access Agreements",
            "uuid": "012149b7-7c59-4220-83bf-d6879a886f20"
        },
        {
            "category": "Personnel Security",
            "code": "PS-7",
            "label": "External Personnel Security",
            "uuid": "54db3434-c9cc-4a09-90a0-7e94aa29ae61"
        },
        {
            "category": "Personnel Security",
            "code": "PS-8",
            "label": "Personnel Sanctions",
            "uuid": "4b7824ea-dc4e-4938-9ebd-36b865f88585"
        },
        {
            "category": "Risk Assessment",
            "code": "RA-1",
            "label": "Risk Assessment Policy and Procedures",
            "uuid": "675a9b3f-8abe-4b6f-948e-b701c2a02a84"
        },
        {
            "category": "Risk Assessment",
            "code": "RA-2",
            "label": "Security Categorization",
            "uuid": "e30e5bc6-c3f4-4714-9c0a-6aed3e4daa6d"
        },
        {
            "category": "Risk Assessment",
            "code": "RA-3",
            "label": "Risk Assessment",
            "uuid": "8a174f26-95ff-41dd-8042-039189065395"
        },
        {
            "category": "Risk Assessment",
            "code": "RA-5",
            "label": "Vulnerability Scanning",
            "uuid": "9e62441a-c6d5-4707-a835-6230dc5b0d53"
        },
        {
            "category": "Risk Assessment",
            "code": "RA-6",
            "label": "Technical Surveillance Countermeasures Survey",
            "uuid": "8bc26841-e02d-4eb6-9842-fbd30b5a9e6a"
        },
        {
            "category": "Risk Assessment",
            "code": "RA-7",
            "label": "Risk Response",
            "uuid": "f19db716-460e-44f8-a2d2-304cbbe54b73"
        },
        {
            "category": "Risk Assessment",
            "code": "RA-8",
            "label": "Privacy Impact Assessment",
            "uuid": "e54190a1-12f2-46d1-b36b-0e7b49b85e43"
        },
        {
            "category": "Risk Assessment",
            "code": "RA-9",
            "label": "Criticality Analysis",
            "uuid": "a6a327ee-3850-4c6c-8828-03cbe4ac83df"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-1",
            "label": "System and Services Acquisition Policy and Procedures",
            "uuid": "53cbe570-60ce-4aba-9f32-f7cfce6fdc56"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-2",
            "label": "Allocation of Resources",
            "uuid": "54613df0-e745-4205-a828-827aca596814"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-3",
            "label": "System Development Life Cycle",
            "uuid": "d6871e86-4df5-4d80-8529-3ec214940b69"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-4",
            "label": "Acquisition Process",
            "uuid": "729aa83b-a59b-48a0-b0a0-c592402dcae7"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-5",
            "label": "System Documentation",
            "uuid": "d32c4960-9581-4717-9a02-690d61709153"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-8",
            "label": "Security and Privacy Engineering Principles",
            "uuid": "6fd6cc79-208a-4f2c-8a05-9adae75fd255"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-9",
            "label": "External System Services",
            "uuid": "64f93d70-568f-404a-a049-b7f37598ec66"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-10",
            "label": "Developer Configuration Management",
            "uuid": "769c7460-a4d0-45f3-a36e-4b8347526278"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-11",
            "label": "Developer Testing and Evaluation",
            "uuid": "cd6f1fb6-d9ee-40c8-bc00-8b485185cf15"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-12",
            "label": "Supply Chain Risk Management",
            "uuid": "9df48cd7-7ec8-4ac6-9563-68087e9c49d6"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-15",
            "label": "Development Process, Standards, and Tools",
            "uuid": "650ec6f8-fbad-4fe7-a0db-62d3861a5372"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-16",
            "label": "Developer-Provided Training",
            "uuid": "6c3aaa6d-9e7c-4dd3-b753-ba11c11ae5a6"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-17",
            "label": "Developer Security Architecture and Design",
            "uuid": "95f027c8-c84f-474f-bd23-872f96e00dc9"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-18",
            "label": "Tamper Resistance and Detection",
            "uuid": "280c9bba-f2e4-401f-911a-cdab227ac433"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-19",
            "label": "Component Authenticity",
            "uuid": "bf85f2a4-2b80-4ae9-b4b5-5c2084c04061"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-20",
            "label": "Customized Development of Critical Components",
            "uuid": "6a025dc5-0215-4e6d-a637-554dadeee055"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-21",
            "label": "Developer Screening",
            "uuid": "7277cac1-5813-4356-b108-72fe5263f8c3"
        },
        {
            "category": "System And Services Acquisition",
            "code": "SA-22",
            "label": "Unsupported System Components",
            "uuid": "b39366a0-a64c-4b2f-b414-3798db55ecbd"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-1",
            "label": "System and Communications Protection Policy and Procedures",
            "uuid": "11fe35fa-d904-4137-9961-307097961e0c"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-2",
            "label": "Application Partitioning",
            "uuid": "48a48a13-9de4-4284-adba-4dbdca2ff535"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-3",
            "label": "Security Function Isolation",
            "uuid": "44defc1c-50d1-43a3-9ffe-c85213ef031a"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-4",
            "label": "Information in Shared Systems Resources",
            "uuid": "bfd580de-f47b-43b4-9470-7416ff778c72"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-5",
            "label": "Denial of Service Protection",
            "uuid": "f929ec71-03e0-40a2-92eb-4078894a18a2"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-6",
            "label": "Resource Availability",
            "uuid": "76c33e82-04e2-4ee5-88c6-40939d8349a7"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-7",
            "label": "Boundary Protection",
            "uuid": "a6586afd-bc0f-4334-88da-615989665368"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-8",
            "label": "Transmission Confidentiality and Integrity",
            "uuid": "583129dc-d3e3-49c3-8ee9-3fbf18e020de"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-10",
            "label": "Network Disconnect",
            "uuid": "09932f73-e48b-4d2b-bced-733f4039902e"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-11",
            "label": "Trusted Path",
            "uuid": "282a9038-ea94-420f-bbaf-fe4abc7addce"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-12",
            "label": "Cryptographic Key Establishment and Management",
            "uuid": "6726eb21-52f9-4922-a1d6-50c098ddba74"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-13",
            "label": "Cryptographic Protection",
            "uuid": "edd532b7-577e-441b-820c-3b73fbd11c79"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-15",
            "label": "Collaborative Computing Devices and Applications",
            "uuid": "d44c41d6-5fa9-4fac-9751-a8236a103c35"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-16",
            "label": "Transmission of Security and Privacy Attributes",
            "uuid": "35964415-2e6b-4a69-b04b-5e0208872f56"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-17",
            "label": "Public Key Infrastructure Certificates",
            "uuid": "c2f67a16-dc82-4d43-a71b-63e2143f9b73"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-18",
            "label": "Mobile Code",
            "uuid": "6f766bc2-750a-4249-89c9-39cf288143d5"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-19",
            "label": "Voice Over Internet Protocol",
            "uuid": "a33021fe-acc7-43cb-9556-8d0ccfe41cf1"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-20",
            "label": "Secure Name / Address Resolution Service (Authoritative Source)",
            "uuid": "4797690e-c2e2-4106-878e-14d789fe1b06"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-21",
            "label": "Secure Name / Address Resolution Service (Recursive or Caching Resolver)",
            "uuid": "6938d14b-381c-4077-9505-7c33c62b6e34"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-22",
            "label": "Architecture and Provisioning for Name / Address Resolution Service",
            "uuid": "ac363e88-daae-4198-aa53-f704e103ef02"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-23",
            "label": "Session Authenticity",
            "uuid": "d80f59b0-9c5f-4ca8-b18f-9e07f791e66e"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-24",
            "label": "Fail in Known State",
            "uuid": "a3829b6b-d219-4f77-9da6-528349ddd6e4"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-25",
            "label": "Thin Nodes",
            "uuid": "6eadc9b8-2337-4847-ace5-f68686199ee7"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-26",
            "label": "Honeypots",
            "uuid": "61ba9758-69d7-4794-a425-187b9ab3750e"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-27",
            "label": "Platform-Independent Applications",
            "uuid": "65261ecf-bb17-4e63-af33-46b0084bb27a"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-28",
            "label": "Protection of Information At Rest",
            "uuid": "a35f7748-5868-46cd-9dea-b4e87fde8311"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-29",
            "label": "Heterogeneity",
            "uuid": "d9e23dad-dcf3-4def-86e9-5af6a6d631ce"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-30",
            "label": "Concealment and Misdirection",
            "uuid": "84eca642-948e-466e-91cf-509f6f4b74fa"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-31",
            "label": "Covert Channel Analysis",
            "uuid": "716c6729-ab0f-4334-a9e6-278dea6a702b"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-32",
            "label": "System Partitioning",
            "uuid": "41ba0004-50a7-44bb-9ca4-5f84ce06e4c0"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-34",
            "label": "Non-Modifiable Executable Programs",
            "uuid": "158f92a7-c6fe-4f88-bf35-b6ea4163ff28"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-35",
            "label": "Honeyclients",
            "uuid": "d7baf2e4-8155-4e33-aa3b-4474252c4de4"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-36",
            "label": "Distributed Processing and Storage",
            "uuid": "f3a16482-f15d-49ea-b206-b3f7400513fd"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-37",
            "label": "Out-of-Band Channels",
            "uuid": "108a06d5-4b5d-4728-9823-d106445d8880"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-38",
            "label": "Operations Security",
            "uuid": "cb78c641-26f3-4a31-bcec-ab7ffdeafef2"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-39",
            "label": "Process Isolation",
            "uuid": "be303727-2dc9-4e23-a026-282fa8012ed6"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-40",
            "label": "Wireless Link Protection",
            "uuid": "714ae5c2-00a0-4163-b949-699dfd3ab8a0"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-41",
            "label": "Port and I/O Device Access",
            "uuid": "f98811b7-6972-4372-96b0-4f13bb8d49d6"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-42",
            "label": "Sensor Capability and Data",
            "uuid": "d6dbd662-e58c-4422-b591-d7b0be5d73fd"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-43",
            "label": "Usage Restrictions",
            "uuid": "b5a7b5c7-6c5b-4014-b30c-6fe8325b564c"
        },
        {
            "category": "System And Communications Protection",
            "code": "SC-44",
            "label": "Detonation Chambers",
            "uuid": "d8aa0a75-a5b2-4556-9664-5b1d5ea7419c"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-1",
            "label": "System and Information Integrity Policy and Procedures",
            "uuid": "96e2a11b-1b39-4903-be42-374102c930df"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-2",
            "label": "Flaw Remediation",
            "uuid": "83caa43e-7179-4477-8665-66d47d058417"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-3",
            "label": "Malicious Code Protection",
            "uuid": "15dfbe37-4a2d-4df7-b00c-f558524b561c"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-4",
            "label": "System Monitoring",
            "uuid": "d4546ede-ed2f-4bbc-a485-150bbdb4e9c2"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-5",
            "label": "Security Alerts, Advisories, and Directives",
            "uuid": "3d9c8de5-f6f2-4a5d-8093-74849dc24a82"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-6",
            "label": "Security and Privacy Function Verification",
            "uuid": "fa2d6a81-6a4e-41c7-91da-9024f91a7685"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-7",
            "label": "Software, Firmware, and Information Integrity",
            "uuid": "b4f2c588-db91-4ad4-8122-9d3805a8a54a"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-8",
            "label": "Spam Protection",
            "uuid": "8cf0e5df-fb43-4dd0-a65e-d635d5902ffc"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-10",
            "label": "Information Input Validation",
            "uuid": "b3fef043-6788-406c-857f-788a044344a3"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-11",
            "label": "Error Handling",
            "uuid": "16a412c2-2f76-4b61-917b-cb5372626bb2"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-12",
            "label": "Information Handling and Retention",
            "uuid": "2fd75399-324e-40ed-9a82-80089816f398"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-13",
            "label": "Predictable Failure Prevention",
            "uuid": "1f5c3fc5-4d27-4018-9f49-ca7edc61d5b4"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-14",
            "label": "Non-Persistence",
            "uuid": "fc3d8c4c-8ced-4f4a-8ad0-a1ae01b35a21"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-15",
            "label": "Information Output Filtering",
            "uuid": "039e5e9e-19cf-436b-b4fd-d0cfa4547110"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-16",
            "label": "Memory Protection",
            "uuid": "9e1e9b36-aa61-4d54-a07c-2c74c341282c"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-17",
            "label": "Fail-Safe Procedures",
            "uuid": "f2787cae-deb0-4090-9ed7-866b15d96df2"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-18",
            "label": "Information Disposal",
            "uuid": "bf1d6c37-e1e1-4c78-8055-79a364219193"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-19",
            "label": "Data Quality Operations",
            "uuid": "bca47b93-453b-47d8-8527-16c4fdd8f6e5"
        },
        {
            "category": "System And Information Integrity",
            "code": "SI-20",
            "label": "De-Identification",
            "uuid": "5c1413f5-14f3-48bc-b371-5fda85e52cb8"
        }
    ],
    "refs": [
        "https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/draft"
    ],
    "uuid": "cfd2cd50-95fa-4143-b0e5-794249bacae1",
    "version": "5.0"
}