Description
Recommended Security Controls for Federal Information Systems and Organizations. (Rev.5)
Owning organization
Validating JSON schema
Security referentials (provided by Various contributors)
Creator
License
Creative Commons Zero v1.0 Universal
Related objects
Definition of the object
{
"label": "NIST SP 800-53",
"language": "EN",
"refs": [
"https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/draft"
],
"uuid": "cfd2cd50-95fa-4143-b0e5-794249bacae1",
"values": [
{
"category": "Access Control",
"code": "AC-1",
"label": "Access Control Policy and Procedures",
"uuid": "ebf10522-0f57-4880-aa73-e28a206b7be4"
},
{
"category": "Access Control",
"code": "AC-2",
"label": "Account Management",
"uuid": "8245e3a6-09ee-488a-880f-8d1b811b2091"
},
{
"category": "Access Control",
"code": "AC-3",
"label": "Access Enforcement",
"uuid": "f3cc0b06-2294-49fe-aca4-3eb929cc87eb"
},
{
"category": "Access Control",
"code": "AC-4",
"label": "Information Flow Enforcement",
"uuid": "e2323e31-d4c5-4f58-8de3-529d41c7fde6"
},
{
"category": "Access Control",
"code": "AC-5",
"label": "Separation of Duties",
"uuid": "35f0172f-4770-4f69-9aa7-8b48a880c85a"
},
{
"category": "Access Control",
"code": "AC-6",
"label": "Least Privilege",
"uuid": "cea02331-b15a-42bb-ae5c-826afb449240"
},
{
"category": "Access Control",
"code": "AC-7",
"label": "Unsuccessful Logon Attempts",
"uuid": "f8e45f26-413c-4c61-be2c-216ec688ecb1"
},
{
"category": "Access Control",
"code": "AC-8",
"label": "System Use Notification",
"uuid": "2006d82c-a148-470f-ad3d-339980bb69b9"
},
{
"category": "Access Control",
"code": "AC-9",
"label": "Previous Logon (Access) Notification",
"uuid": "a06fe04e-e834-42c9-8b4f-d998eb493136"
},
{
"category": "Access Control",
"code": "AC-10",
"label": "Concurrent Session Control",
"uuid": "2feed753-8333-46b9-b4a0-ffd78e6d5f96"
},
{
"category": "Access Control",
"code": "AC-11",
"label": "Device Lock",
"uuid": "48e9827d-60b5-4637-89fa-45dfb4231ff7"
},
{
"category": "Access Control",
"code": "AC-12",
"label": "Session Termination",
"uuid": "db302cfa-325b-4d4d-a6b3-f85618ca4eb6"
},
{
"category": "Access Control",
"code": "AC-14",
"label": "Permitted Actions without Identification or Authentication",
"uuid": "90b4a207-023d-4ac4-a1dd-c5ca32453de2"
},
{
"category": "Access Control",
"code": "AC-16",
"label": "Security and Privacy Attributes",
"uuid": "33d42330-bde6-4964-82c9-fd2eaa07792d"
},
{
"category": "Access Control",
"code": "AC-17",
"label": "Remote Access",
"uuid": "1b2e1483-0a0e-4c84-ad44-42db07d6172f"
},
{
"category": "Access Control",
"code": "AC-18",
"label": "Wireless Access",
"uuid": "5dad70d6-04e6-4ad0-9c32-c565e40329ad"
},
{
"category": "Access Control",
"code": "AC-19",
"label": "Access Control for Mobile Devices",
"uuid": "250001c2-f02d-496c-917e-70034724bfd6"
},
{
"category": "Access Control",
"code": "AC-20",
"label": "Use of External Systems",
"uuid": "fc9d8985-7dea-4b78-b977-7c5ac82e15f2"
},
{
"category": "Access Control",
"code": "AC-21",
"label": "Information Sharing",
"uuid": "5d4dc43c-9c46-4fc5-969b-02a1421acf42"
},
{
"category": "Access Control",
"code": "AC-22",
"label": "Publicly Accessible Content",
"uuid": "81cc10c0-de1e-4317-aae9-304a4c45151e"
},
{
"category": "Access Control",
"code": "AC-23",
"label": "Data Mining Protection",
"uuid": "ccd5e72f-92d7-4824-8caa-9a75209849d2"
},
{
"category": "Access Control",
"code": "AC-24",
"label": "Access Control Decisions",
"uuid": "5493d4a2-bae6-4bdf-ba84-79bbae4fb53b"
},
{
"category": "Access Control",
"code": "AC-25",
"label": "Reference Monitor",
"uuid": "6922787a-2fcb-4cfe-a3bc-a75e7c49fccd"
},
{
"category": "Awareness And Training",
"code": "AT-1",
"label": "Awareness and Training Policy and Procedures",
"uuid": "468658d8-61b8-4757-8c28-d6017337ea91"
},
{
"category": "Awareness And Training",
"code": "AT-2",
"label": "Awareness Training",
"uuid": "3f956648-f1a8-4c8f-9e4b-11e4da8afc6a"
},
{
"category": "Awareness And Training",
"code": "AT-3",
"label": "Role-Based Training",
"uuid": "64694da5-0ca9-44f6-bd94-0dc1fa8f69ea"
},
{
"category": "Awareness And Training",
"code": "AT-4",
"label": "Training Records",
"uuid": "a32e8643-88b7-4fa6-9a25-f67b9236b9d0"
},
{
"category": "Audit And Accountability",
"code": "AU-1",
"label": "Audit and Accountability Policy and Procedures",
"uuid": "0de44076-cd30-439a-9375-c7c6692da6b2"
},
{
"category": "Audit And Accountability",
"code": "AU-2",
"label": "Audit Events",
"uuid": "8b250e6b-4463-4d55-9241-c99db31a838c"
},
{
"category": "Audit And Accountability",
"code": "AU-3",
"label": "Content of Audit Records",
"uuid": "aefeafa5-2f92-4a78-a149-6b00f8a0f9f1"
},
{
"category": "Audit And Accountability",
"code": "AU-4",
"label": "Audit Storage Capacity",
"uuid": "6145995f-74e1-4479-ba93-c1cdd9e34f8c"
},
{
"category": "Audit And Accountability",
"code": "AU-5",
"label": "Response to Audit Processing Failures",
"uuid": "bcc90c0a-8c92-4e75-ba67-a9dd2a64ca9d"
},
{
"category": "Audit And Accountability",
"code": "AU-6",
"label": "Audit Review, Analysis, and Reporting",
"uuid": "cb39be02-c637-4984-ad59-ad1b5afd7609"
},
{
"category": "Audit And Accountability",
"code": "AU-7",
"label": "Audit Reduction and Report Generation",
"uuid": "8314aca6-82c0-4955-a6d3-78f41146ef15"
},
{
"category": "Audit And Accountability",
"code": "AU-8",
"label": "Time Stamps",
"uuid": "b9383590-e160-4840-b6e7-9476aeb6b8c0"
},
{
"category": "Audit And Accountability",
"code": "AU-9",
"label": "Protection of Audit Information",
"uuid": "aff838cd-5392-4620-be39-87c4ae7b6d33"
},
{
"category": "Audit And Accountability",
"code": "AU-10",
"label": "Non-repudiation",
"uuid": "52e68421-ebcf-453f-8e42-48813d47dcf6"
},
{
"category": "Audit And Accountability",
"code": "AU-11",
"label": "Audit Record Retention",
"uuid": "30ccd853-e570-4c61-98d0-4837692d0654"
},
{
"category": "Audit And Accountability",
"code": "AU-12",
"label": "Audit Generation",
"uuid": "67e16eb6-14cb-41a4-aea0-8f0dc7ed1023"
},
{
"category": "Audit And Accountability",
"code": "AU-13",
"label": "Monitoring for Information Disclosure",
"uuid": "ca6dc3b4-45ad-4a17-84c2-06fe7de2936e"
},
{
"category": "Audit And Accountability",
"code": "AU-14",
"label": "Session Audit",
"uuid": "d447bf80-7c6e-4e16-9f69-a15ed7eafd92"
},
{
"category": "Audit And Accountability",
"code": "AU-15",
"label": "Alternate Audit Capability",
"uuid": "43d6e18f-7d4e-43f5-af7f-ea6d07d37299"
},
{
"category": "Audit And Accountability",
"code": "AU-16",
"label": "Cross-Organizational Auditing",
"uuid": "e499f145-1fad-49e2-9403-f50a2a9801e8"
},
{
"category": "Security Assessment And Authorization",
"code": "CA-1",
"label": "Assessment, Authorization, and Monitoring Policies and Procedures",
"uuid": "9bc48f7a-6863-421d-96c5-7e7099ef2415"
},
{
"category": "Security Assessment And Authorization",
"code": "CA-2",
"label": "Assessments",
"uuid": "1efbb7bc-a9df-41b0-af65-c8c7cc593246"
},
{
"category": "Security Assessment And Authorization",
"code": "CA-3",
"label": "System Interconnections",
"uuid": "6c55f12d-0f58-4caf-9c27-91c38d3620e3"
},
{
"category": "Security Assessment And Authorization",
"code": "CA-5",
"label": "Plan of Action and Milestones",
"uuid": "0af9100d-df42-4d7e-953d-8c1fd56dff85"
},
{
"category": "Security Assessment And Authorization",
"code": "CA-6",
"label": "Authorization",
"uuid": "de31dbbb-4981-4815-acfa-8375989d98cd"
},
{
"category": "Security Assessment And Authorization",
"code": "CA-7",
"label": "Continuous Monitoring",
"uuid": "5264169d-4e61-40b7-800e-1998f41af781"
},
{
"category": "Security Assessment And Authorization",
"code": "CA-8",
"label": "Penetration Testing",
"uuid": "2080500f-047a-4695-841f-326310fd6a79"
},
{
"category": "Security Assessment And Authorization",
"code": "CA-9",
"label": "Internal System Connections",
"uuid": "063f894b-5f12-4e99-8277-6e21692c977d"
},
{
"category": "Configuration Management",
"code": "CM-1",
"label": "Configuration Management Policy and Procedures",
"uuid": "698ebcc9-cf38-49d4-9a7a-dce61bbff968"
},
{
"category": "Configuration Management",
"code": "CM-2",
"label": "Baseline Configuration",
"uuid": "3b076d55-a168-4e4e-ba44-cac820929399"
},
{
"category": "Configuration Management",
"code": "CM-3",
"label": "Configuration Change Control",
"uuid": "27086d2c-4ed0-4163-89c3-d280559102ea"
},
{
"category": "Configuration Management",
"code": "CM-4",
"label": "Security and Privacy Impact Analyses",
"uuid": "4d738f6e-3999-4a07-97f8-552ef2df77f3"
},
{
"category": "Configuration Management",
"code": "CM-5",
"label": "Access Restrictions for Change",
"uuid": "dce2b6b6-33dd-45b1-9006-e09493aa95e3"
},
{
"category": "Configuration Management",
"code": "CM-6",
"label": "Configuration Settings",
"uuid": "dfeeec44-4cd4-49f8-8a41-2c03f786f818"
},
{
"category": "Configuration Management",
"code": "CM-7",
"label": "Least Functionality",
"uuid": "d0557646-d1eb-4d79-8670-b1cdaf1072be"
},
{
"category": "Configuration Management",
"code": "CM-8",
"label": "System Component Inventory",
"uuid": "36ae972c-4543-4548-8946-47cb651ed0ef"
},
{
"category": "Configuration Management",
"code": "CM-9",
"label": "Configuration Management Plan",
"uuid": "b53a00fb-054c-4f9e-8aff-69ad91c1dcb8"
},
{
"category": "Configuration Management",
"code": "CM-10",
"label": "Software Usage Restrictions",
"uuid": "8ccaf96b-99b1-4677-be72-1e072cc26ebd"
},
{
"category": "Configuration Management",
"code": "CM-11",
"label": "User-Installed Software",
"uuid": "0e0864af-bd66-4012-b7ea-75ee7a57ef0b"
},
{
"category": "Configuration Management",
"code": "CM-12",
"label": "Information Location",
"uuid": "50310b7b-0a4b-4572-998c-5954f7d6750e"
},
{
"category": "Contingency Planning",
"code": "CP-1",
"label": "Contingency Planning Policy and Procedures",
"uuid": "c1aa25a1-a0cf-483d-8b7d-44725cd3f6ed"
},
{
"category": "Contingency Planning",
"code": "CP-2",
"label": "Contingency Plan",
"uuid": "4f08538a-9f7d-422f-aaae-0949bf39c028"
},
{
"category": "Contingency Planning",
"code": "CP-3",
"label": "Contingency Training",
"uuid": "a3a1db7e-c1e1-409d-aa9a-e4b4ca925be6"
},
{
"category": "Contingency Planning",
"code": "CP-4",
"label": "Contingency Plan Testing",
"uuid": "4c98569b-ec41-4758-b8a3-5bd75b56d38b"
},
{
"category": "Contingency Planning",
"code": "CP-6",
"label": "Alternate Storage Site",
"uuid": "60a84903-025a-40c5-9cf6-dad960e55cf1"
},
{
"category": "Contingency Planning",
"code": "CP-7",
"label": "Alternate Processing Site",
"uuid": "1dfd046a-a422-4089-9fda-c141e865042a"
},
{
"category": "Contingency Planning",
"code": "CP-8",
"label": "Telecommunications Services",
"uuid": "01096bf7-a45e-40d9-851e-72a6b8d7344a"
},
{
"category": "Contingency Planning",
"code": "CP-9",
"label": "System Backup",
"uuid": "5cdd85f2-15b0-4c61-b3d4-66f4ba9114c8"
},
{
"category": "Contingency Planning",
"code": "CP-10",
"label": "System Recovery and Reconstitution",
"uuid": "5ba61017-362e-411b-929d-c76c27358660"
},
{
"category": "Contingency Planning",
"code": "CP-11",
"label": "Alternate Communications Protocols",
"uuid": "b705c1c5-aee2-4cb0-9f55-f045fc627f34"
},
{
"category": "Contingency Planning",
"code": "CP-12",
"label": "Safe Mode",
"uuid": "b827b7db-76ee-4fda-b193-3004feef59e0"
},
{
"category": "Contingency Planning",
"code": "CP-13",
"label": "Alternative Security Mechanisms",
"uuid": "5278ff6f-473b-4a2c-8234-1a6a3198c701"
},
{
"category": "Identification And Authentication",
"code": "IA-1",
"label": "Identification and Authentication Policy and Procedures",
"uuid": "99e77822-723b-4a08-8ee0-4c73ad494db7"
},
{
"category": "Identification And Authentication",
"code": "IA-2",
"label": "Identification and Authentication (Organizational Users)",
"uuid": "b82eba2f-bbf7-4390-aa9e-e35ccae691ba"
},
{
"category": "Identification And Authentication",
"code": "IA-3",
"label": "Device Identification and Authentication",
"uuid": "e37e0d76-3ea8-49e4-b65b-a5e2645a902a"
},
{
"category": "Identification And Authentication",
"code": "IA-4",
"label": "Identifier Management",
"uuid": "23ab9d48-396c-4f20-9344-e6a6bd2439a2"
},
{
"category": "Identification And Authentication",
"code": "IA-5",
"label": "Authenticator Management",
"uuid": "d0c5fc8d-1e95-4e70-bdfd-f31d368af8f0"
},
{
"category": "Identification And Authentication",
"code": "IA-6",
"label": "Authenticator Feedback",
"uuid": "1bf6a2b8-b728-49a2-953f-0a965d966db1"
},
{
"category": "Identification And Authentication",
"code": "IA-7",
"label": "Cryptographic Module Authentication",
"uuid": "7c68c0c2-fea5-44d1-8580-5170edd92e22"
},
{
"category": "Identification And Authentication",
"code": "IA-8",
"label": "Identification and Authentication (Non-Organizational Users)",
"uuid": "df6812ce-357b-44ae-8979-a663a85fa687"
},
{
"category": "Identification And Authentication",
"code": "IA-9",
"label": "Service Identification and Authentication",
"uuid": "17a82de8-0490-4100-a4fb-2ad9af49d594"
},
{
"category": "Identification And Authentication",
"code": "IA-10",
"label": "Adaptive Authentication",
"uuid": "f0b81b68-372d-4ced-9c6b-7d8ae3da799c"
},
{
"category": "Identification And Authentication",
"code": "IA-11",
"label": "Re-authentication",
"uuid": "625e343d-7aa1-46e1-939b-50f5b8f5f5b4"
},
{
"category": "Identification And Authentication",
"code": "IA-12",
"label": "Identity Proofing",
"uuid": "c183aff2-8e42-439c-9392-d6823321ec9e"
},
{
"category": "Individual Participation",
"code": "IP-1",
"label": "Individual Participation Policy and Procedures",
"uuid": "b41dacdb-78d6-4744-bcae-5a46b95cfe04"
},
{
"category": "Individual Participation",
"code": "IP-2",
"label": "Consent",
"uuid": "4123ace0-da01-431c-997c-bd03e3319f36"
},
{
"category": "Individual Participation",
"code": "IP-3",
"label": "Redress",
"uuid": "72eed0db-aa5a-4677-899f-b56d01187c6e"
},
{
"category": "Individual Participation",
"code": "IP-4",
"label": "Privacy Notice",
"uuid": "d351c523-45f7-405c-aa9e-eb4289dea021"
},
{
"category": "Individual Participation",
"code": "IP-5",
"label": "Privacy Act Statement",
"uuid": "90b76f4c-10ec-4530-a7c8-b3d488d8886d"
},
{
"category": "Individual Participation",
"code": "IP-6",
"label": "Individual Access",
"uuid": "67e6c588-aea1-47c7-a34e-e04bf91df582"
},
{
"category": "Incident Response",
"code": "IR-1",
"label": "Incident Response Policy and Procedures",
"uuid": "74b14d2d-6320-4ac9-9b74-d93177dd4329"
},
{
"category": "Incident Response",
"code": "IR-2",
"label": "Incident Response Training",
"uuid": "1476a1d4-f1f5-42ae-93a6-1227a89cb3e3"
},
{
"category": "Incident Response",
"code": "IR-3",
"label": "Incident Response Testing",
"uuid": "e8449cab-54ae-4bd4-8b6e-de2820e8ec4b"
},
{
"category": "Incident Response",
"code": "IR-4",
"label": "Incident Handling",
"uuid": "3e0e9ea8-db9d-4825-b76a-17859f2f8e67"
},
{
"category": "Incident Response",
"code": "IR-5",
"label": "Incident Monitoring",
"uuid": "10213f53-5179-42f2-beb6-1364872d983d"
},
{
"category": "Incident Response",
"code": "IR-6",
"label": "Incident Reporting",
"uuid": "69e93c59-0239-4bc8-8d5f-d2c65c706f46"
},
{
"category": "Incident Response",
"code": "IR-7",
"label": "Incident Response Assistance",
"uuid": "54802539-1d62-43c3-8f7e-8c7e03087812"
},
{
"category": "Incident Response",
"code": "IR-8",
"label": "Incident Response Plan",
"uuid": "c2260bd5-161f-4fb9-8496-0de50c2c3440"
},
{
"category": "Incident Response",
"code": "IR-9",
"label": "Information Spillage Response",
"uuid": "e1211579-cdf4-4357-ba8a-3a5c46401837"
},
{
"category": "Incident Response",
"code": "IR-10",
"label": "Integrated Information Security Analysis Team",
"uuid": "a781d945-be41-4457-aef9-5f1757031940"
},
{
"category": "Maintenance",
"code": "MA-1",
"label": "System Maintenance Policy and Procedures",
"uuid": "7fb408ab-f358-489d-be81-5b9395da78a7"
},
{
"category": "Maintenance",
"code": "MA-2",
"label": "Controlled Maintenance",
"uuid": "9d4a3657-457f-4223-adfe-d0b2df91ffc3"
},
{
"category": "Maintenance",
"code": "MA-3",
"label": "Maintenance Tools",
"uuid": "508b0a74-cd81-4a65-b2c1-bb4c193adc53"
},
{
"category": "Maintenance",
"code": "MA-4",
"label": "Nonlocal Maintenance",
"uuid": "a8768b25-29ff-4b0a-a61e-89a2dacb2ff8"
},
{
"category": "Maintenance",
"code": "MA-5",
"label": "Maintenance Personnel",
"uuid": "be8d5a19-945d-4b26-9499-790193e65b06"
},
{
"category": "Maintenance",
"code": "MA-6",
"label": "Timely Maintenance",
"uuid": "9368a916-1fac-4dd2-b621-751ef4483a72"
},
{
"category": "Media Protection",
"code": "MP-1",
"label": "Media Protection Policy and Procedures",
"uuid": "bcc51690-d12c-41a8-bd76-6aae187a8afc"
},
{
"category": "Media Protection",
"code": "MP-2",
"label": "Media Access",
"uuid": "14555491-0f15-428b-9ecd-836c6307675c"
},
{
"category": "Media Protection",
"code": "MP-3",
"label": "Media Marking",
"uuid": "70ccf1af-4cad-443a-9dcd-9b49c4b6aec8"
},
{
"category": "Media Protection",
"code": "MP-4",
"label": "Media Storage",
"uuid": "50272033-eb78-4309-84e0-303320d75b87"
},
{
"category": "Media Protection",
"code": "MP-5",
"label": "Media Transport",
"uuid": "025d84e9-5612-404e-acf4-5d860c01a73c"
},
{
"category": "Media Protection",
"code": "MP-6",
"label": "Media Sanitization",
"uuid": "b0779c7f-7db2-4af2-ab93-5c000a889408"
},
{
"category": "Media Protection",
"code": "MP-7",
"label": "Media Use",
"uuid": "cc087e48-874b-4953-adcc-96fac3f19306"
},
{
"category": "Media Protection",
"code": "MP-8",
"label": "Media Downgrading",
"uuid": "b6ed1637-26e3-4278-9552-89601f278d8c"
},
{
"category": "Privacy Authorization",
"code": "PA-1",
"label": "Privacy Authorization Policy and Procedures",
"uuid": "5b92c7ee-202b-4de8-983c-74937b86b48f"
},
{
"category": "Privacy Authorization",
"code": "PA-2",
"label": "Authority to Collect",
"uuid": "ee9525ea-a06f-4862-b6c8-c09fa266ea38"
},
{
"category": "Privacy Authorization",
"code": "PA-3",
"label": "Purpose Specification",
"uuid": "dc814dd1-359d-4245-839c-5a1cdd6e1bad"
},
{
"category": "Privacy Authorization",
"code": "PA-4",
"label": "Information Sharing With External Parties",
"uuid": "f7c64768-dc70-4e4d-b121-58f41bfde7c6"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-1",
"label": "Physical and Environmental Protection Policy and Procedures",
"uuid": "c1738677-3cae-4833-97b4-f2f3c04dd5e0"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-2",
"label": "Physical Access Authorizations",
"uuid": "e3d43ffd-1286-42c0-98fa-0e2e75d233e7"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-3",
"label": "Physical Access Control",
"uuid": "06679cfa-1bfd-436a-b99d-698fb275dfdb"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-4",
"label": "Access Control for Transmission",
"uuid": "f1dc5cba-17a8-4bee-aad0-d6b0ca84124d"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-5",
"label": "Access Control for Output Devices",
"uuid": "e8ed7158-ffc1-44a4-8673-80286ad97b36"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-6",
"label": "Monitoring Physical Access",
"uuid": "e48c2a77-93da-4afb-bde7-7bd957196286"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-8",
"label": "Visitor Access Records",
"uuid": "b3ee40ae-b296-4e88-9033-cb669e98f11c"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-9",
"label": "Power Equipment and Cabling",
"uuid": "7c9127dc-e0e8-4a6f-9cf9-82f5a7b18f37"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-10",
"label": "Emergency Shutoff",
"uuid": "990ee3a7-3044-4c8f-8387-946a7a9aba76"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-11",
"label": "Emergency Power",
"uuid": "6d3fbb99-fa7d-4c65-9c5f-928044a5840f"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-12",
"label": "Emergency Lighting",
"uuid": "5cf67afa-7a43-4dd4-b1db-dd28862a689c"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-13",
"label": "Fire Protection",
"uuid": "51e4fd6c-0aa8-4604-b13d-bf74c9706922"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-14",
"label": "Temperature and Humidity Controls",
"uuid": "9dda0a30-be3d-4752-867d-bf9570971c52"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-15",
"label": "Water Damage Protection",
"uuid": "6448f036-bdb2-4f21-8e30-0acf8073215d"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-16",
"label": "Delivery and Removal",
"uuid": "de6195c6-1fc1-423a-a748-785653c9324f"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-17",
"label": "Alternate Work Site",
"uuid": "aead24db-a196-4daf-a099-60b1d1991d70"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-18",
"label": "Location of System Components",
"uuid": "53ae3aa9-d88e-4f55-a040-375cfe348c48"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-19",
"label": "Information Leakage",
"uuid": "244cbc08-55d5-46ea-ba28-aec72f16b337"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-20",
"label": "Asset Monitoring and Tracking",
"uuid": "2fd70998-9247-4efd-923d-276f5c76b3b9"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-21",
"label": "Electromagnetic Pulse Protection",
"uuid": "b3523d09-add6-4b33-aa3e-6f780d83a9d6"
},
{
"category": "Physical And Environmental Protection",
"code": "PE-22",
"label": "Component Marking",
"uuid": "cd7d903b-0282-4895-8501-47b568183e97"
},
{
"category": "Planning",
"code": "PL-1",
"label": "Planning Policy and Procedures",
"uuid": "3c492512-da9f-4112-a76a-3e5cb0400e6f"
},
{
"category": "Planning",
"code": "PL-2",
"label": "Security and Privacy Plans",
"uuid": "8047a1c6-e890-4817-982d-04fcdc2820a2"
},
{
"category": "Planning",
"code": "PL-4",
"label": "Rules of Behavior",
"uuid": "7b481f8c-2485-40a8-aee7-03b39721e103"
},
{
"category": "Planning",
"code": "PL-7",
"label": "Concept of Operations",
"uuid": "7f388f12-77ec-47bf-b816-79cb42086b09"
},
{
"category": "Planning",
"code": "PL-8",
"label": "Security and Privacy Architectures",
"uuid": "3bffd1eb-e6a7-47ad-927a-0d679048ed5a"
},
{
"category": "Planning",
"code": "PL-9",
"label": "Central Management",
"uuid": "5b9bdfcc-3150-4c4a-8b08-386d9a829585"
},
{
"category": "Planning",
"code": "PL-10",
"label": "Baseline Selection",
"uuid": "5df5007e-c8cd-4cc8-845b-0d0bb0daf66f"
},
{
"category": "Planning",
"code": "PL-11",
"label": "Baseline Tailoring",
"uuid": "828560f0-7ac9-4960-aed9-6d618173a663"
},
{
"category": "Program Management",
"code": "PM-1",
"label": "Information Security Program Plan",
"uuid": "3ceb9dfc-c9e2-4cb6-830d-8170d53d5b05"
},
{
"category": "Program Management",
"code": "PM-2",
"label": "Information Security Program Roles",
"uuid": "293ebc1c-0452-41f8-ab14-101846241a47"
},
{
"category": "Program Management",
"code": "PM-3",
"label": "Information Security and Privacy Resources",
"uuid": "898d7024-6d3f-4d9a-868f-34ea1e451801"
},
{
"category": "Program Management",
"code": "PM-4",
"label": "Plan of Action and Milestones Process",
"uuid": "08327040-541f-40b4-a1cc-815d9298afe0"
},
{
"category": "Program Management",
"code": "PM-5",
"label": "System Inventory",
"uuid": "515fb4c4-2a45-47b7-9a7a-5878f1bbad9c"
},
{
"category": "Program Management",
"code": "PM-6",
"label": "Measures of Performance",
"uuid": "d5a60a37-684d-4b4b-b8a2-7d03814ff70d"
},
{
"category": "Program Management",
"code": "PM-7",
"label": "Enterprise Architecture",
"uuid": "ecefd9da-a07c-41c2-9397-017e878bdb67"
},
{
"category": "Program Management",
"code": "PM-8",
"label": "Critical Infrastructure Plan",
"uuid": "2d2a7dc6-2770-4897-ac0b-492e7ddd24ed"
},
{
"category": "Program Management",
"code": "PM-9",
"label": "Risk Management Strategy",
"uuid": "44b2a62a-6bc7-4474-b618-f1bc15e9798f"
},
{
"category": "Program Management",
"code": "PM-10",
"label": "Authorization Process",
"uuid": "ec1457b8-d116-45a4-8c61-5b8ddba8a2b9"
},
{
"category": "Program Management",
"code": "PM-11",
"label": "Mission and Business Process Definition",
"uuid": "9a4b8ede-d722-44b8-a04f-ae78cbd266ab"
},
{
"category": "Program Management",
"code": "PM-12",
"label": "Insider Threat Program",
"uuid": "9a9f32cf-d951-4909-98fe-c6a936af3913"
},
{
"category": "Program Management",
"code": "PM-13",
"label": "Security and Privacy Workforce",
"uuid": "b395f91d-24a4-4720-8534-3b491bb41002"
},
{
"category": "Program Management",
"code": "PM-14",
"label": "Testing, Training, and Monitoring",
"uuid": "8ff7acc4-c71b-4e1d-89f3-0c7db4a5055f"
},
{
"category": "Program Management",
"code": "PM-15",
"label": "Contacts with Groups and Associations",
"uuid": "e1219fd8-9db2-4297-99da-63be2b433aa8"
},
{
"category": "Program Management",
"code": "PM-16",
"label": "Threat Awareness Program",
"uuid": "9dd48833-5045-4e37-aa9a-2b69ee11739d"
},
{
"category": "Program Management",
"code": "PM-17",
"label": "Protecting Controlled Unclassified Information on External Systems",
"uuid": "e25168b6-fb5b-4ae7-a14c-6afc86246348"
},
{
"category": "Program Management",
"code": "PM-18",
"label": "Privacy Program Plan",
"uuid": "ab16520f-0c45-404d-8852-df2722a96412"
},
{
"category": "Program Management",
"code": "PM-19",
"label": "Privacy Program Roles",
"uuid": "8e3958aa-59c3-4c3e-9cf0-1283d783ec46"
},
{
"category": "Program Management",
"code": "PM-20",
"label": "System of Records Notice",
"uuid": "3585bbce-5c3b-4a2a-8a53-5c4af9467365"
},
{
"category": "Program Management",
"code": "PM-21",
"label": "Dissemination of Privacy Program Information",
"uuid": "41ad2d98-3dc5-4167-a8cf-869b3b53c495"
},
{
"category": "Program Management",
"code": "PM-22",
"label": "Accounting of Disclosures",
"uuid": "d7d3d288-cd67-40ea-871a-4aa256262dbf"
},
{
"category": "Program Management",
"code": "PM-23",
"label": "Data Quality Management",
"uuid": "a43a957c-c1ce-462f-87b8-bcb962a26991"
},
{
"category": "Program Management",
"code": "PM-24",
"label": "Data Management Board",
"uuid": "9c603ddb-5850-42a9-85bd-641667182bed"
},
{
"category": "Program Management",
"code": "PM-25",
"label": "Data Integrity Board",
"uuid": "54ca56bb-3a0e-47b9-8cdb-b28976481e54"
},
{
"category": "Program Management",
"code": "PM-26",
"label": "Minimization of Personally Identifiable Information",
"uuid": "e2aa9575-d1f9-440c-a3ae-72f79489dd3c"
},
{
"category": "Program Management",
"code": "PM-27",
"label": "Individual Access Control",
"uuid": "ce8a976a-536a-44ea-bb8b-bcf28a6931c8"
},
{
"category": "Program Management",
"code": "PM-28",
"label": "Complaint Management",
"uuid": "15f0293a-cef3-4c58-a6cf-725f0ea044c5"
},
{
"category": "Program Management",
"code": "PM-29",
"label": "Inventory of Personally Identifiable Information",
"uuid": "7f02ee88-5118-467b-bffc-c6176276db0a"
},
{
"category": "Program Management",
"code": "PM-30",
"label": "Privacy Reporting",
"uuid": "a6ae4db0-5f77-4e60-ae47-fa721623bcdb"
},
{
"category": "Program Management",
"code": "PM-31",
"label": "Supply Chain Risk Management Plan",
"uuid": "da890a6a-f2be-44f2-b3f2-4ac8e84cd66a"
},
{
"category": "Program Management",
"code": "PM-32",
"label": "Risk Framing",
"uuid": "2c4575a5-0d0a-40f7-8b8f-8a1c1a67b1e4"
},
{
"category": "Personnel Security",
"code": "PS-1",
"label": "Personnel Security Policy and Procedures",
"uuid": "3e6cdfcd-14f3-4b34-a6d4-62d677332806"
},
{
"category": "Personnel Security",
"code": "PS-2",
"label": "Position Risk Designation",
"uuid": "fd87a967-2217-418d-8378-b0773b7ca356"
},
{
"category": "Personnel Security",
"code": "PS-3",
"label": "Personnel Screening",
"uuid": "22faa4a0-2027-4150-8176-c77e84e3f03d"
},
{
"category": "Personnel Security",
"code": "PS-4",
"label": "Personnel Termination",
"uuid": "4d28a85e-20d2-4186-995e-de48a90eebb4"
},
{
"category": "Personnel Security",
"code": "PS-5",
"label": "Personnel Transfer",
"uuid": "db5781c8-b759-47de-9862-27b2d3c2b568"
},
{
"category": "Personnel Security",
"code": "PS-6",
"label": "Access Agreements",
"uuid": "012149b7-7c59-4220-83bf-d6879a886f20"
},
{
"category": "Personnel Security",
"code": "PS-7",
"label": "External Personnel Security",
"uuid": "54db3434-c9cc-4a09-90a0-7e94aa29ae61"
},
{
"category": "Personnel Security",
"code": "PS-8",
"label": "Personnel Sanctions",
"uuid": "4b7824ea-dc4e-4938-9ebd-36b865f88585"
},
{
"category": "Risk Assessment",
"code": "RA-1",
"label": "Risk Assessment Policy and Procedures",
"uuid": "675a9b3f-8abe-4b6f-948e-b701c2a02a84"
},
{
"category": "Risk Assessment",
"code": "RA-2",
"label": "Security Categorization",
"uuid": "e30e5bc6-c3f4-4714-9c0a-6aed3e4daa6d"
},
{
"category": "Risk Assessment",
"code": "RA-3",
"label": "Risk Assessment",
"uuid": "8a174f26-95ff-41dd-8042-039189065395"
},
{
"category": "Risk Assessment",
"code": "RA-5",
"label": "Vulnerability Scanning",
"uuid": "9e62441a-c6d5-4707-a835-6230dc5b0d53"
},
{
"category": "Risk Assessment",
"code": "RA-6",
"label": "Technical Surveillance Countermeasures Survey",
"uuid": "8bc26841-e02d-4eb6-9842-fbd30b5a9e6a"
},
{
"category": "Risk Assessment",
"code": "RA-7",
"label": "Risk Response",
"uuid": "f19db716-460e-44f8-a2d2-304cbbe54b73"
},
{
"category": "Risk Assessment",
"code": "RA-8",
"label": "Privacy Impact Assessment",
"uuid": "e54190a1-12f2-46d1-b36b-0e7b49b85e43"
},
{
"category": "Risk Assessment",
"code": "RA-9",
"label": "Criticality Analysis",
"uuid": "a6a327ee-3850-4c6c-8828-03cbe4ac83df"
},
{
"category": "System And Services Acquisition",
"code": "SA-1",
"label": "System and Services Acquisition Policy and Procedures",
"uuid": "53cbe570-60ce-4aba-9f32-f7cfce6fdc56"
},
{
"category": "System And Services Acquisition",
"code": "SA-2",
"label": "Allocation of Resources",
"uuid": "54613df0-e745-4205-a828-827aca596814"
},
{
"category": "System And Services Acquisition",
"code": "SA-3",
"label": "System Development Life Cycle",
"uuid": "d6871e86-4df5-4d80-8529-3ec214940b69"
},
{
"category": "System And Services Acquisition",
"code": "SA-4",
"label": "Acquisition Process",
"uuid": "729aa83b-a59b-48a0-b0a0-c592402dcae7"
},
{
"category": "System And Services Acquisition",
"code": "SA-5",
"label": "System Documentation",
"uuid": "d32c4960-9581-4717-9a02-690d61709153"
},
{
"category": "System And Services Acquisition",
"code": "SA-8",
"label": "Security and Privacy Engineering Principles",
"uuid": "6fd6cc79-208a-4f2c-8a05-9adae75fd255"
},
{
"category": "System And Services Acquisition",
"code": "SA-9",
"label": "External System Services",
"uuid": "64f93d70-568f-404a-a049-b7f37598ec66"
},
{
"category": "System And Services Acquisition",
"code": "SA-10",
"label": "Developer Configuration Management",
"uuid": "769c7460-a4d0-45f3-a36e-4b8347526278"
},
{
"category": "System And Services Acquisition",
"code": "SA-11",
"label": "Developer Testing and Evaluation",
"uuid": "cd6f1fb6-d9ee-40c8-bc00-8b485185cf15"
},
{
"category": "System And Services Acquisition",
"code": "SA-12",
"label": "Supply Chain Risk Management",
"uuid": "9df48cd7-7ec8-4ac6-9563-68087e9c49d6"
},
{
"category": "System And Services Acquisition",
"code": "SA-15",
"label": "Development Process, Standards, and Tools",
"uuid": "650ec6f8-fbad-4fe7-a0db-62d3861a5372"
},
{
"category": "System And Services Acquisition",
"code": "SA-16",
"label": "Developer-Provided Training",
"uuid": "6c3aaa6d-9e7c-4dd3-b753-ba11c11ae5a6"
},
{
"category": "System And Services Acquisition",
"code": "SA-17",
"label": "Developer Security Architecture and Design",
"uuid": "95f027c8-c84f-474f-bd23-872f96e00dc9"
},
{
"category": "System And Services Acquisition",
"code": "SA-18",
"label": "Tamper Resistance and Detection",
"uuid": "280c9bba-f2e4-401f-911a-cdab227ac433"
},
{
"category": "System And Services Acquisition",
"code": "SA-19",
"label": "Component Authenticity",
"uuid": "bf85f2a4-2b80-4ae9-b4b5-5c2084c04061"
},
{
"category": "System And Services Acquisition",
"code": "SA-20",
"label": "Customized Development of Critical Components",
"uuid": "6a025dc5-0215-4e6d-a637-554dadeee055"
},
{
"category": "System And Services Acquisition",
"code": "SA-21",
"label": "Developer Screening",
"uuid": "7277cac1-5813-4356-b108-72fe5263f8c3"
},
{
"category": "System And Services Acquisition",
"code": "SA-22",
"label": "Unsupported System Components",
"uuid": "b39366a0-a64c-4b2f-b414-3798db55ecbd"
},
{
"category": "System And Communications Protection",
"code": "SC-1",
"label": "System and Communications Protection Policy and Procedures",
"uuid": "11fe35fa-d904-4137-9961-307097961e0c"
},
{
"category": "System And Communications Protection",
"code": "SC-2",
"label": "Application Partitioning",
"uuid": "48a48a13-9de4-4284-adba-4dbdca2ff535"
},
{
"category": "System And Communications Protection",
"code": "SC-3",
"label": "Security Function Isolation",
"uuid": "44defc1c-50d1-43a3-9ffe-c85213ef031a"
},
{
"category": "System And Communications Protection",
"code": "SC-4",
"label": "Information in Shared Systems Resources",
"uuid": "bfd580de-f47b-43b4-9470-7416ff778c72"
},
{
"category": "System And Communications Protection",
"code": "SC-5",
"label": "Denial of Service Protection",
"uuid": "f929ec71-03e0-40a2-92eb-4078894a18a2"
},
{
"category": "System And Communications Protection",
"code": "SC-6",
"label": "Resource Availability",
"uuid": "76c33e82-04e2-4ee5-88c6-40939d8349a7"
},
{
"category": "System And Communications Protection",
"code": "SC-7",
"label": "Boundary Protection",
"uuid": "a6586afd-bc0f-4334-88da-615989665368"
},
{
"category": "System And Communications Protection",
"code": "SC-8",
"label": "Transmission Confidentiality and Integrity",
"uuid": "583129dc-d3e3-49c3-8ee9-3fbf18e020de"
},
{
"category": "System And Communications Protection",
"code": "SC-10",
"label": "Network Disconnect",
"uuid": "09932f73-e48b-4d2b-bced-733f4039902e"
},
{
"category": "System And Communications Protection",
"code": "SC-11",
"label": "Trusted Path",
"uuid": "282a9038-ea94-420f-bbaf-fe4abc7addce"
},
{
"category": "System And Communications Protection",
"code": "SC-12",
"label": "Cryptographic Key Establishment and Management",
"uuid": "6726eb21-52f9-4922-a1d6-50c098ddba74"
},
{
"category": "System And Communications Protection",
"code": "SC-13",
"label": "Cryptographic Protection",
"uuid": "edd532b7-577e-441b-820c-3b73fbd11c79"
},
{
"category": "System And Communications Protection",
"code": "SC-15",
"label": "Collaborative Computing Devices and Applications",
"uuid": "d44c41d6-5fa9-4fac-9751-a8236a103c35"
},
{
"category": "System And Communications Protection",
"code": "SC-16",
"label": "Transmission of Security and Privacy Attributes",
"uuid": "35964415-2e6b-4a69-b04b-5e0208872f56"
},
{
"category": "System And Communications Protection",
"code": "SC-17",
"label": "Public Key Infrastructure Certificates",
"uuid": "c2f67a16-dc82-4d43-a71b-63e2143f9b73"
},
{
"category": "System And Communications Protection",
"code": "SC-18",
"label": "Mobile Code",
"uuid": "6f766bc2-750a-4249-89c9-39cf288143d5"
},
{
"category": "System And Communications Protection",
"code": "SC-19",
"label": "Voice Over Internet Protocol",
"uuid": "a33021fe-acc7-43cb-9556-8d0ccfe41cf1"
},
{
"category": "System And Communications Protection",
"code": "SC-20",
"label": "Secure Name / Address Resolution Service (Authoritative Source)",
"uuid": "4797690e-c2e2-4106-878e-14d789fe1b06"
},
{
"category": "System And Communications Protection",
"code": "SC-21",
"label": "Secure Name / Address Resolution Service (Recursive or Caching Resolver)",
"uuid": "6938d14b-381c-4077-9505-7c33c62b6e34"
},
{
"category": "System And Communications Protection",
"code": "SC-22",
"label": "Architecture and Provisioning for Name / Address Resolution Service",
"uuid": "ac363e88-daae-4198-aa53-f704e103ef02"
},
{
"category": "System And Communications Protection",
"code": "SC-23",
"label": "Session Authenticity",
"uuid": "d80f59b0-9c5f-4ca8-b18f-9e07f791e66e"
},
{
"category": "System And Communications Protection",
"code": "SC-24",
"label": "Fail in Known State",
"uuid": "a3829b6b-d219-4f77-9da6-528349ddd6e4"
},
{
"category": "System And Communications Protection",
"code": "SC-25",
"label": "Thin Nodes",
"uuid": "6eadc9b8-2337-4847-ace5-f68686199ee7"
},
{
"category": "System And Communications Protection",
"code": "SC-26",
"label": "Honeypots",
"uuid": "61ba9758-69d7-4794-a425-187b9ab3750e"
},
{
"category": "System And Communications Protection",
"code": "SC-27",
"label": "Platform-Independent Applications",
"uuid": "65261ecf-bb17-4e63-af33-46b0084bb27a"
},
{
"category": "System And Communications Protection",
"code": "SC-28",
"label": "Protection of Information At Rest",
"uuid": "a35f7748-5868-46cd-9dea-b4e87fde8311"
},
{
"category": "System And Communications Protection",
"code": "SC-29",
"label": "Heterogeneity",
"uuid": "d9e23dad-dcf3-4def-86e9-5af6a6d631ce"
},
{
"category": "System And Communications Protection",
"code": "SC-30",
"label": "Concealment and Misdirection",
"uuid": "84eca642-948e-466e-91cf-509f6f4b74fa"
},
{
"category": "System And Communications Protection",
"code": "SC-31",
"label": "Covert Channel Analysis",
"uuid": "716c6729-ab0f-4334-a9e6-278dea6a702b"
},
{
"category": "System And Communications Protection",
"code": "SC-32",
"label": "System Partitioning",
"uuid": "41ba0004-50a7-44bb-9ca4-5f84ce06e4c0"
},
{
"category": "System And Communications Protection",
"code": "SC-34",
"label": "Non-Modifiable Executable Programs",
"uuid": "158f92a7-c6fe-4f88-bf35-b6ea4163ff28"
},
{
"category": "System And Communications Protection",
"code": "SC-35",
"label": "Honeyclients",
"uuid": "d7baf2e4-8155-4e33-aa3b-4474252c4de4"
},
{
"category": "System And Communications Protection",
"code": "SC-36",
"label": "Distributed Processing and Storage",
"uuid": "f3a16482-f15d-49ea-b206-b3f7400513fd"
},
{
"category": "System And Communications Protection",
"code": "SC-37",
"label": "Out-of-Band Channels",
"uuid": "108a06d5-4b5d-4728-9823-d106445d8880"
},
{
"category": "System And Communications Protection",
"code": "SC-38",
"label": "Operations Security",
"uuid": "cb78c641-26f3-4a31-bcec-ab7ffdeafef2"
},
{
"category": "System And Communications Protection",
"code": "SC-39",
"label": "Process Isolation",
"uuid": "be303727-2dc9-4e23-a026-282fa8012ed6"
},
{
"category": "System And Communications Protection",
"code": "SC-40",
"label": "Wireless Link Protection",
"uuid": "714ae5c2-00a0-4163-b949-699dfd3ab8a0"
},
{
"category": "System And Communications Protection",
"code": "SC-41",
"label": "Port and I/O Device Access",
"uuid": "f98811b7-6972-4372-96b0-4f13bb8d49d6"
},
{
"category": "System And Communications Protection",
"code": "SC-42",
"label": "Sensor Capability and Data",
"uuid": "d6dbd662-e58c-4422-b591-d7b0be5d73fd"
},
{
"category": "System And Communications Protection",
"code": "SC-43",
"label": "Usage Restrictions",
"uuid": "b5a7b5c7-6c5b-4014-b30c-6fe8325b564c"
},
{
"category": "System And Communications Protection",
"code": "SC-44",
"label": "Detonation Chambers",
"uuid": "d8aa0a75-a5b2-4556-9664-5b1d5ea7419c"
},
{
"category": "System And Information Integrity",
"code": "SI-1",
"label": "System and Information Integrity Policy and Procedures",
"uuid": "96e2a11b-1b39-4903-be42-374102c930df"
},
{
"category": "System And Information Integrity",
"code": "SI-2",
"label": "Flaw Remediation",
"uuid": "83caa43e-7179-4477-8665-66d47d058417"
},
{
"category": "System And Information Integrity",
"code": "SI-3",
"label": "Malicious Code Protection",
"uuid": "15dfbe37-4a2d-4df7-b00c-f558524b561c"
},
{
"category": "System And Information Integrity",
"code": "SI-4",
"label": "System Monitoring",
"uuid": "d4546ede-ed2f-4bbc-a485-150bbdb4e9c2"
},
{
"category": "System And Information Integrity",
"code": "SI-5",
"label": "Security Alerts, Advisories, and Directives",
"uuid": "3d9c8de5-f6f2-4a5d-8093-74849dc24a82"
},
{
"category": "System And Information Integrity",
"code": "SI-6",
"label": "Security and Privacy Function Verification",
"uuid": "fa2d6a81-6a4e-41c7-91da-9024f91a7685"
},
{
"category": "System And Information Integrity",
"code": "SI-7",
"label": "Software, Firmware, and Information Integrity",
"uuid": "b4f2c588-db91-4ad4-8122-9d3805a8a54a"
},
{
"category": "System And Information Integrity",
"code": "SI-8",
"label": "Spam Protection",
"uuid": "8cf0e5df-fb43-4dd0-a65e-d635d5902ffc"
},
{
"category": "System And Information Integrity",
"code": "SI-10",
"label": "Information Input Validation",
"uuid": "b3fef043-6788-406c-857f-788a044344a3"
},
{
"category": "System And Information Integrity",
"code": "SI-11",
"label": "Error Handling",
"uuid": "16a412c2-2f76-4b61-917b-cb5372626bb2"
},
{
"category": "System And Information Integrity",
"code": "SI-12",
"label": "Information Handling and Retention",
"uuid": "2fd75399-324e-40ed-9a82-80089816f398"
},
{
"category": "System And Information Integrity",
"code": "SI-13",
"label": "Predictable Failure Prevention",
"uuid": "1f5c3fc5-4d27-4018-9f49-ca7edc61d5b4"
},
{
"category": "System And Information Integrity",
"code": "SI-14",
"label": "Non-Persistence",
"uuid": "fc3d8c4c-8ced-4f4a-8ad0-a1ae01b35a21"
},
{
"category": "System And Information Integrity",
"code": "SI-15",
"label": "Information Output Filtering",
"uuid": "039e5e9e-19cf-436b-b4fd-d0cfa4547110"
},
{
"category": "System And Information Integrity",
"code": "SI-16",
"label": "Memory Protection",
"uuid": "9e1e9b36-aa61-4d54-a07c-2c74c341282c"
},
{
"category": "System And Information Integrity",
"code": "SI-17",
"label": "Fail-Safe Procedures",
"uuid": "f2787cae-deb0-4090-9ed7-866b15d96df2"
},
{
"category": "System And Information Integrity",
"code": "SI-18",
"label": "Information Disposal",
"uuid": "bf1d6c37-e1e1-4c78-8055-79a364219193"
},
{
"category": "System And Information Integrity",
"code": "SI-19",
"label": "Data Quality Operations",
"uuid": "bca47b93-453b-47d8-8527-16c4fdd8f6e5"
},
{
"category": "System And Information Integrity",
"code": "SI-20",
"label": "De-Identification",
"uuid": "5c1413f5-14f3-48bc-b371-5fda85e52cb8"
}
],
"version": 5
}