Evaluate compliance with NIST SP 800-53 Revision 5 security and privacy controls for federal information systems and organizations
AC-2, AC-5, AC-6: User access management and privilege restrictions
IA-2(1): MFA for network and privileged access
AC-7: Account lockout after failed attempts
AT-2: Literacy training covering threats, responsibilities, and acceptable use
AT-2(2): Insider threat and social engineering awareness
AU-2, AU-9: Audit logging and log protection
AU-6: Audit review, analysis, and reporting
AU-11: Audit log retention requirements
CA-2: Independent security control assessments
CA-6: Authorization decisions based on risk acceptance
CA-5: Tracking of security deficiencies
IR-4: Incident handling capability and procedures
IR-6: US-CERT reporting within timeframes
IR-3: Tabletop exercises and simulations
RA-3: Risk assessment methodology and cadence
RA-5: Vulnerability monitoring and remediation
RA-5(5): Privileged access for vulnerability scanning
SC-8, SC-13: TLS 1.2+ for data transmission
SC-7: Boundary protection and network segmentation
SI-3: Malicious code protection on all endpoints
SI-2: 30 days for high-risk, 90 days for moderate
Please answer all required questions to see your results