U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

security control baseline

Definition(s):

  The set of minimum security controls defined for a low-impact, moderate-impact, or high-impact information system.
Source(s):
FIPS 200 under SECURITY CONTROL BASELINE
NIST SP 800-18 Rev. 1 under Security Control Baseline
NIST SP 800-39 under Security Control Baseline from CNSSI 4009
NIST SP 800-53 Rev. 5 from OMB Circular A-130 (2016)
NIST SP 800-53B from OMB Circular A-130 (2016)

  The set of minimum security controls defined for a low-impact, moderate-impact, or high-impact information system. A set of information security controls that has been established through information security strategic planning activities to address one or more specified security categorizations; this set of security controls is intended to be the initial security control set selected for a specific system once that system’s security categorization is determined.
Source(s):
NIST SP 800-30 Rev. 1 under Security Control Baseline from CNSSI 4009, CNSSI 1253

  One of the sets of minimum security controls defined for federal information systems in NIST Special Publication 800-53 and CNSS Instruction 1253.
Source(s):
NIST SP 800-137 under Security Control Baseline from FIPS 200 - Adapted
NIST SP 800-53A Rev. 4 under Security Control Baseline from FIPS 200 - Adapted

  The set of minimum security controls defined for a low-impact, moderate-impact, or high-impact information system that provides a starting point for the tailoring process.
Source(s):
NIST SP 800-53 Rev. 4 under Security Control Baseline from FIPS 200 - Adapted

  The set of minimum security controls defined for a low-impact, moderate- impact, or high-impact information system.
Source(s):
CNSSI 4009-2015 from FIPS 200

  The set of minimum security controls defined for a low-impact, moderate-impact, or high-impact information system. See also control baseline.
Source(s):
NIST SP 800-37 Rev. 2