Semantic D3FEND Mappings to NIST 800-53

The D3FEND team created this mapping in order to help users navigate between the two data sets.

Download in CSV, TSV, JSON-LD.
CatalogControlRelationDefensive TechniqueTechnique
NIST SP 800-53 R5AC-2(1)broaderAccount LockingAccount Locking
NIST SP 800-53 R5AC-2(1)broaderMulti-factor AuthenticationMulti-factor Authentication
NIST SP 800-53 R5AC-2(2)broaderAccount LockingAccount Locking
NIST SP 800-53 R5AC-2(3)broaderAccount LockingAccount Locking
NIST SP 800-53 R5AC-2(4)relatedDomain Account MonitoringDomain Account Monitoring
NIST SP 800-53 R5AC-2(5)relatedAccount LockingAccount Locking
NIST SP 800-53 R5AC-2(7)narrowerUser Account PermissionsUser Account Permissions
NIST SP 800-53 R5AC-2(9)narrowerUser Account PermissionsUser Account Permissions
NIST SP 800-53 R5AC-2(13)narrowerAccount LockingAccount Locking
NIST SP 800-53 R5AC-3narrowerExecutable AllowlistingExecutable Allowlisting
NIST SP 800-53 R5AC-3narrowerExecutable DenylistingExecutable Denylisting
NIST SP 800-53 R5AC-3(8)narrowerSystem Call FilteringSystem Call Filtering
NIST SP 800-53 R5AC-4narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(1)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(1)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(3)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(3)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(4)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(4)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(5)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(5)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(6)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(6)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(8)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(8)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(10)broaderInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(10)broaderOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(11)broaderInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(11)broaderOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(12)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(12)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(13)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(13)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(14)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(14)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(15)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(15)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(17)narrowerDomain Trust PolicyDomain Trust Policy
NIST SP 800-53 R5AC-4(19)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(19)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(20)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(20)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(21)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(21)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(26)narrowerFile Content RulesFile Content Rules
NIST SP 800-53 R5AC-4(27)exactlyInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(27)exactlyOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(28)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(28)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(29)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(29)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(30)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(30)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-4(32)narrowerInbound Traffic FilteringInbound Traffic Filtering
NIST SP 800-53 R5AC-4(32)narrowerOutbound Traffic FilteringOutbound Traffic Filtering
NIST SP 800-53 R5AC-5broaderLocal File PermissionsLocal File Permissions
NIST SP 800-53 R5AC-5broaderUser Account PermissionsUser Account Permissions
NIST SP 800-53 R5AC-6broaderLocal File PermissionsLocal File Permissions
NIST SP 800-53 R5AC-6broaderUser Account PermissionsUser Account Permissions
NIST SP 800-53 R5AC-6(1)exactlySystem Configuration PermissionsSystem Configuration Permissions
NIST SP 800-53 R5AC-6(3)exactlySystem Configuration PermissionsSystem Configuration Permissions
NIST SP 800-53 R5AC-6(4)narrowerHardware-based Process IsolationHardware-based Process Isolation
NIST SP 800-53 R5AC-6(5)narrowerLocal File PermissionsLocal File Permissions
NIST SP 800-53 R5AC-6(5)narrowerSystem Configuration PermissionsSystem Configuration Permissions
NIST SP 800-53 R5AC-6(6)narrowerLocal File PermissionsLocal File Permissions
NIST SP 800-53 R5AC-6(6)narrowerSystem Configuration PermissionsSystem Configuration Permissions
NIST SP 800-53 R5AC-6(9)broaderLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5AC-6(9)broaderUser Behavior AnalysisUser Behavior Analysis
NIST SP 800-53 R5AC-6(10)narrowerLocal File PermissionsLocal File Permissions
NIST SP 800-53 R5AC-6(10)narrowerSystem Configuration PermissionsSystem Configuration Permissions
NIST SP 800-53 R5AC-7exactlyAccount LockingAccount Locking
NIST SP 800-53 R5AC-7(3)narrowerAccount LockingAccount Locking
NIST SP 800-53 R5AC-7(4)broaderAccount LockingAccount Locking
NIST SP 800-53 R5AC-17(8)broaderExecutable DenylistingExecutable Denylisting
NIST SP 800-53 R5AC-23narrowerJob Function Access Pattern AnalysisJob Function Access Pattern Analysis
NIST SP 800-53 R5AC-23narrowerLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5AC-23narrowerResource Access Pattern AnalysisResource Access Pattern Analysis
NIST SP 800-53 R5AC-23narrowerUser Data Transfer AnalysisUser Data Transfer Analysis
NIST SP 800-53 R5AC-24(1)narrowerUser Account PermissionsUser Account Permissions
NIST SP 800-53 R5AC-24(2)narrowerUser Account PermissionsUser Account Permissions
NIST SP 800-53 R5AU-2exactlyLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5AU-2(1)exactlyLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5AU-2(2)exactlyLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5AU-3exactlyLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5AU-4narrowerLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5AU-10(5)broaderDriver Load Integrity CheckingDriver Load Integrity Checking
NIST SP 800-53 R5AU-14(2)narrowerLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5AU-15narrowerLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5CM-5narrowerExecutable AllowlistingExecutable Allowlisting
NIST SP 800-53 R5CM-5narrowerExecutable DenylistingExecutable Denylisting
NIST SP 800-53 R5CM-5narrowerLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5CM-5(1)narrowerLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5CM-5(3)narrowerLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5CM-5(3)narrowerSystem Configuration PermissionsSystem Configuration Permissions
NIST SP 800-53 R5CM-5(5)narrowerLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5CM-5(5)narrowerSystem Configuration PermissionsSystem Configuration Permissions
NIST SP 800-53 R5CM-5(6)narrowerLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5CM-5(6)narrowerSystem Configuration PermissionsSystem Configuration Permissions
NIST SP 800-53 R5CM-6(3)broaderApplication Configuration HardeningApplication Configuration Hardening
NIST SP 800-53 R5CM-14relatedDriver Load Integrity CheckingDriver Load Integrity Checking
NIST SP 800-53 R5CM-14relatedMessage AuthenticationMessage Authentication
NIST SP 800-53 R5IA-2(1)narrowerMulti-factor AuthenticationMulti-factor Authentication
NIST SP 800-53 R5IA-2(2)narrowerMulti-factor AuthenticationMulti-factor Authentication
NIST SP 800-53 R5IA-2(4)narrowerLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5IA-2(6)narrowerMulti-factor AuthenticationMulti-factor Authentication
NIST SP 800-53 R5IR-4(12)relatedDynamic AnalysisDynamic Analysis
NIST SP 800-53 R5IR-4(13)relatedDecoy EnvironmentDecoy Environment
NIST SP 800-53 R5IR-4(13)relatedDecoy ObjectDecoy Object
NIST SP 800-53 R5MA-3(3)narrowerUser Account PermissionsUser Account Permissions
NIST SP 800-53 R5MA-3(4)narrowerUser Account PermissionsUser Account Permissions
NIST SP 800-53 R5MA-3(5)narrowerUser Account PermissionsUser Account Permissions
NIST SP 800-53 R5MA-3(6)narrowerSoftware UpdateSoftware Update
NIST SP 800-53 R5MA-4(1)narrowerLocal Account MonitoringLocal Account Monitoring
NIST SP 800-53 R5MA-6narrowerSoftware UpdateSoftware Update
NIST SP 800-53 R5MA-6(1)narrowerSoftware UpdateSoftware Update
NIST SP 800-53 R5MA-6(2)narrowerSoftware UpdateSoftware Update
NIST SP 800-53 R5MA-6(3)narrowerSoftware UpdateSoftware Update
NIST SP 800-53 R5RA-3(3)broaderFile AnalysisFile Analysis
NIST SP 800-53 R5RA-3(3)broaderIdentifier AnalysisIdentifier Analysis
NIST SP 800-53 R5RA-3(3)broaderMessage AnalysisMessage Analysis
NIST SP 800-53 R5RA-3(3)broaderNetwork Traffic AnalysisNetwork Traffic Analysis
NIST SP 800-53 R5RA-3(3)broaderPlatform MonitoringPlatform Monitoring
NIST SP 800-53 R5RA-3(3)broaderProcess AnalysisProcess Analysis
NIST SP 800-53 R5RA-3(3)broaderUser Behavior AnalysisUser Behavior Analysis
NIST SP 800-53 R5RA-3(4)narrowerFile AnalysisFile Analysis
NIST SP 800-53 R5RA-3(4)narrowerIdentifier AnalysisIdentifier Analysis
NIST SP 800-53 R5RA-3(4)narrowerMessage AnalysisMessage Analysis
NIST SP 800-53 R5RA-3(4)narrowerNetwork Traffic AnalysisNetwork Traffic Analysis
NIST SP 800-53 R5RA-3(4)narrowerPlatform MonitoringPlatform Monitoring
NIST SP 800-53 R5RA-3(4)narrowerProcess AnalysisProcess Analysis
NIST SP 800-53 R5RA-3(4)narrowerUser Behavior AnalysisUser Behavior Analysis
NIST SP 800-53 R5RA-5broaderNetwork Traffic AnalysisNetwork Traffic Analysis
NIST SP 800-53 R5RA-5(2)narrowerNetwork Traffic AnalysisNetwork Traffic Analysis
NIST SP 800-53 R5RA-5(3)narrowerNetwork Traffic AnalysisNetwork Traffic Analysis
NIST SP 800-53 R5RA-5(4)relatedDecoy EnvironmentDecoy Environment
NIST SP 800-53 R5RA-5(4)relatedDecoy ObjectDecoy Object
NIST SP 800-53 R5RA-5(5)narrowerPlatform HardeningPlatform Hardening
NIST SP 800-53 R5RA-5(6)narrowerPlatform HardeningPlatform Hardening
NIST SP 800-53 R5RA-5(7)narrowerExecutable AllowlistingExecutable Allowlisting
NIST SP 800-53 R5RA-5(7)narrowerExecutable DenylistingExecutable Denylisting
NIST SP 800-53 R5SA-8(18)relatedEncrypted TunnelsEncrypted Tunnels
NIST SP 800-53 R5SA-8(22)relatedDomain Account MonitoringDomain Account Monitoring
NIST SP 800-53 R5SA-10(1)relatedFirmware VerificationFirmware Verification
NIST SP 800-53 R5SA-10(1)relatedPlatform HardeningPlatform Hardening
NIST SP 800-53 R5SA-10(3)relatedFirmware VerificationFirmware Verification
NIST SP 800-53 R5SA-10(4)relatedFirmware VerificationFirmware Verification
NIST SP 800-53 R5SA-10(5)relatedFirmware VerificationFirmware Verification
NIST SP 800-53 R5SA-10(5)relatedPlatform HardeningPlatform Hardening
NIST SP 800-53 R5SA-10(6)relatedFirmware VerificationFirmware Verification
NIST SP 800-53 R5SA-10(6)relatedPlatform HardeningPlatform Hardening
NIST SP 800-53 R5SA-11(1)relatedApplication HardeningApplication Hardening
NIST SP 800-53 R5SA-11(8)relatedApplication HardeningApplication Hardening
NIST SP 800-53 R5SC-2broaderLocal File PermissionsLocal File Permissions
NIST SP 800-53 R5SC-2broaderSystem Configuration PermissionsSystem Configuration Permissions
NIST SP 800-53 R5SC-2(1)narrowerLocal File PermissionsLocal File Permissions
NIST SP 800-53 R5SC-2(1)narrowerSystem Configuration PermissionsSystem Configuration Permissions
NIST SP 800-53 R5SC-3broaderExecution IsolationExecution Isolation
NIST SP 800-53 R5SC-3broaderNetwork IsolationNetwork Isolation
NIST SP 800-53 R5SC-3(1)narrowerExecution IsolationExecution Isolation
NIST SP 800-53 R5SI-2(4)narrowerSoftware UpdateSoftware Update
NIST SP 800-53 R5SI-2(5)exactlyFirmware VerificationFirmware Verification
NIST SP 800-53 R5SI-2(5)exactlyPeripheral Firmware VerificationPeripheral Firmware Verification
NIST SP 800-53 R5SI-2(5)exactlySoftware UpdateSoftware Update
NIST SP 800-53 R5SI-2(5)exactlySystem Firmware VerificationSystem Firmware Verification
NIST SP 800-53 R5SI-2(6)narrowerFirmware VerificationFirmware Verification
NIST SP 800-53 R5SI-2(6)narrowerPeripheral Firmware VerificationPeripheral Firmware Verification
NIST SP 800-53 R5SI-2(6)narrowerSoftware UpdateSoftware Update
NIST SP 800-53 R5SI-2(6)narrowerSystem Firmware VerificationSystem Firmware Verification
NIST SP 800-53 R5SI-3broaderFile AnalysisFile Analysis
NIST SP 800-53 R5SI-3broaderNetwork Traffic AnalysisNetwork Traffic Analysis
NIST SP 800-53 R5SI-3broaderPlatform MonitoringPlatform Monitoring
NIST SP 800-53 R5SI-3broaderProcess AnalysisProcess Analysis
NIST SP 800-53 R5SI-3(4)narrowerLocal File PermissionsLocal File Permissions
NIST SP 800-53 R5SI-3(4)narrowerSystem Configuration PermissionsSystem Configuration Permissions
NIST SP 800-53 R5SI-3(8)narrowerUser Behavior AnalysisUser Behavior Analysis
NIST SP 800-53 R5SI-3(10)exactlyDynamic AnalysisDynamic Analysis
NIST SP 800-53 R5SI-4broaderOperating System MonitoringOperating System Monitoring
NIST SP 800-53 R5SI-4(2)narrowerNetwork Traffic AnalysisNetwork Traffic Analysis
NIST SP 800-53 R5SI-4(4)narrowerNetwork Traffic AnalysisNetwork Traffic Analysis