NIST 800-53
A catalog of security and privacy controls published by NIST for federal information systems, widely used as a compliance baseline for government and enterprise environments.
NIST Special Publication 800-53 provides a catalog of security and privacy controls for federal information systems and organizations. The controls in NIST 800-53 are organized into 20 control families covering areas such as access control, incident response, configuration management, and supply chain risk management. NIST 800-53 serves as the baseline for the Risk Management Framework (RMF) and is referenced by other frameworks including FedRAMP, CMMC, and StateRAMP. Organizations outside the federal government also adopt NIST 800-53 as a comprehensive security baseline. CyberUp24's architecture and engineering services are designed with NIST 800-53 alignment built in from the ground up.
Related terms
SOAR (Security Orchestration, Automation and Response)
Technology that automates security workflows, orchestrates tools, and accelerates incident response — transforming manual SOC tasks into intelligent, repeatable processes.
Read full description
S
s
SIEM (Security Information and Event Management)
A platform that aggregates and analyzes security data from across an organization's environment to detect threats and generate alerts in real time.
Read full description
S
s
Vulnerability Scanning
Automated identification and analysis of security weaknesses in systems, networks, and applications to prioritize remediation efforts.
Read full description
V
v
Zero Trust
A security model based on the principle of never trust always verify — requiring continuous authentication and authorization for every user device and connection regardless of location.
Read full description
Z
z
Threat Hunting
A proactive security practice where analysts actively search for hidden threats and adversaries within an organization's environment before alerts are triggered.
Read full description
T
t
SOAR (Security Orchestration Automation and Response)
Technology that automates security workflows, orchestrates tools, and accelerates incident response — transforming manual SOC tasks into intelligent, repeatable processes.
Read full description
S
s
