- NIST SP 800-53 Rev 5: Control Families
- Overview of NIST 800-53 Control Families
- Complete Table of All 20 NIST 800-53 Control Families
-
Description of Each Control Family
- AC — Access Control (25 base controls)
- AT — Awareness and Training (6 base controls)
- AU — Audit and Accountability (16 base controls)
- CA — Assessment, Authorization, and Monitoring (9 base controls)
- CM — Configuration Management (14 base controls)
- CP — Contingency Planning (13 base controls)
- IA — Identification and Authentication (13 base controls)
- IR — Incident Response (10 base controls)
- MA — Maintenance (7 base controls)
- MP — Media Protection (8 base controls)
- PE — Physical and Environmental Protection (23 base controls)
- PL — Planning (11 base controls)
- PM — Program Management (32 base controls)
- PS — Personnel Security (9 base controls)
- PT — Personally Identifiable Information Processing and Transparency (8 base controls, NEW in Rev 5)
- RA — Risk Assessment (10 base controls)
- SA — System and Services Acquisition (24 base controls)
- SC — System and Communications Protection (51 base controls)
- SI — System and Information Integrity (23 base controls)
- SR — Supply Chain Risk Management (12 base controls, NEW in Rev 5)
- Security vs Privacy: How the Control Families Map
- How Control Families Map to Baselines (Low, Moderate, High)
- How to Simplify NIST 800-53 Control Family Mapping
-
NIST 800-53 Control Families FAQs
- How many control families are in NIST 800-53?
- What are the 20 control families in NIST 800-53?
- What are the two new control families added in Rev. 5?
- What is the largest control family?
- Does every control family apply to every organization?
- How do control families relate to FedRAMP?
- How do control families relate to CMMC?
- Is asset management covered in NIST 800-53?
- Key Takeaways
NIST SP 800-53 Rev 5: Control Families
NIST SP 800-53 organizes its 1,196 security and privacy controls into 20 control families or logical groupings that cover everything from access control to supply chain risk management. Together, these families form the organizational backbone of the entire catalog. Without them, navigating the framework’s 324 base controls and control enhancements would be nearly impossible.
But understanding the 20 control families that comprise 800-53 can also be challenging. This article offers practical guidance with a complete reference table, detailed descriptions of every control family, security-versus-privacy mappings, and baseline distributions across Low, Moderate, and High impact levels.
From compliance analysts mapping controls for the first time to IT security professionals preparing for a FISMA audit or teams evaluating FedRAMP requirements, this guide is the single, bookmarkable reference for all 20 NIST 800-53 controls.
New to NIST Special Publication 800-53? Start with our complete guide to NIST 800-53 for the full introduction.
Overview of NIST 800-53 Control Families
A control family in NIST 800-53 is a grouping of related security or privacy controls that address a common area of protection, like access control, incident response, or system integrity. To make the catalog more navigable, the National Institute of Standards and Technology groups controls that share a security or privacy domain into “families.” That way, organizations can assess and implement them in logical batches rather than one control at a time.
NIST 800-53 control families are the 20 top-level categories used to organize the catalog’s 1,196 security and privacy controls. Each family groups together related controls that address a common domain and is identified by a two-letter abbreviation (e.g., AC for Access Control, AU for Audit and Accountability).
NIST SP 800-53 Rev 5 contains exactly 20 control families, which is a significant increase from the 18 control families in Rev 4. With federal cybersecurity priorities evolving, the addition of two new control families — PT (Personally Identifiable Information Processing and Transparency) and SR (Supply Chain Risk Management) — reflect an increasingly strict regulatory landscape.
Each family uses a consistent two-letter prefix for its controls. Access Control controls, for example, are labeled AC-1, AC-2, AC-3, and so on. Audit and Accountability controls, on the other hand, begin with AU. Ultimately, this naming convention makes it easier to identify which family any given control belongs to at a glance.

Source: NIST 800-53 Rev 5 (Section 2.2 Figure 1)
The 20 families also range widely in size. The smallest, Awareness and Training (AT), contains just 6 base controls. The largest, System and Communications Protection (SC), contains 51 base controls. No family is ranked above another in importance. Which families matter most depends entirely on an organization’s risk profile, mission requirements, and regulatory obligations.
While the families themselves are defined in SP 800-53, the baseline allocations that determine which controls apply at each impact level are published separately in SP 800-53B.
Complete Table of All 20 NIST 800-53 Control Families
The following table lists all 20 NIST 800-53 Rev 5 control families in official order, with identifier, family name and base control count. This is the definitive reference for the NIST 800-53 control families list.
| ID | Family Name | Base Controls | Purpose |
| AC | Access Control | 25 | System and data access policies |
| AT | Awareness and Training | 6 | Security and privacy training |
| AU | Audit and Accountability | 16 | Logging, monitoring, and audit trails |
| CA | Assessment, Authorization, and Monitoring | 9 | Assessments, ATOs, and continuous monitoring |
| CM | Configuration Management | 14 | Baseline configurations, change control, and inventories |
| CP | Contingency Planning | 13 | Backup, recovery, and continuity |
| IA | Identification and Authentication | 13 | Identity verification and authentication |
| IR | Incident Response | 10 | Incident handling, reporting, and response |
| MA | Maintenance | 7 | System maintenance |
| MP | Media Protection | 8 | Media handling and santization |
| PE | Physical and Environmental Protection | 23 | Facility access and environmental controls |
| PL | Planning | 11 | Security and privacy planning documents |
| PM | Program Management | 32 | Organization-wide security program |
| PS | Personnel Security | 9 | Screening, termination, and transfers |
| PT | PII Processing and Transparency | 8 | Privacy protections for personally identifiable information (PII) – NEW in Rev 5 |
| RA | Risk Assessment | 10 | Risk identification and vulnerability scanning |
| SA | System and Services Acquisition | 24 | Secure development and acquisition of systems and services |
| SC | System and Communications Protection | 51 | Encryption and boundary protection |
| SI | System and Information Integrity | 23 | Flaw remediation and malicious code protection |
| SR | Supply Chain Risk Management | 12 | Supply chain, vendor, and third-party controls – NEW in Rev 5 |
Note: The counts above are base controls only. When you include control enhancements, NIST 800-53 Rev 5 totals 1,196 controls. How many control families are in NIST 800-53? Exactly 20, or the complete list above.
Now with the full taxonomy established, it’s time to break down what each of these 20 NIST 800-53 control families actually covers.
Description of Each Control Family
Each of the 20 NIST 800-53 control families addresses a distinct security or privacy domain. Here’s what each family covers, including its scope, key controls and practical relevance.
AC — Access Control (25 base controls)
The Access Control family governs who can access systems and data. It defines the conditions and restrictions for that access. Key controls address account management (AC-2), access enforcement (AC-3), separation of duties (AC-5), and least privilege (AC-6). In addition, this family covers remote access (AC-17) and session management (AC-12). As a result, nearly every organization implementing NIST 800-53 spends significant time on this family.
AT — Awareness and Training (6 base controls)
The Awareness and Training family requires organizations to provide role-based security and privacy training. Its controls cover training content, frequency, and documentation. Although this is the smallest family by count, it remains foundational. After all, no amount of technical controls will work if people are not trained to follow security policies.
AU — Audit and Accountability (16 base controls)
The Audit and Accountability family addresses logging, monitoring, and audit trail requirements. Specifically, it covers event logging (AU-2), content of audit records (AU-3), and review and analysis of logs (AU-6). It also includes audit storage and retention (AU-11) and non-repudiation (AU-10). Together, these controls support incident investigation and continuous monitoring.
CA — Assessment, Authorization, and Monitoring (9 base controls)
The CA family covers control assessments, system authorization (Authority to Operate or ATO), and continuous monitoring. It connects closely to the Risk Management Framework (RMF) outlined in NIST SP 800-37. In practice, CA controls help organizations evaluate whether their security controls work correctly and operate as intended.
CM — Configuration Management (14 base controls)
The Configuration Management family addresses baseline configurations, change control processes, and system inventories. CM-8 (System Component Inventory) stands out here. It requires organizations to maintain a comprehensive inventory of all hardware, software, and firmware components. As a result, the CM family effectively makes IT asset inventory management a NIST 800-53 compliance requirement.
CP — Contingency Planning (13 base controls)
Contingency Planning covers business continuity and disaster recovery for continuous operations during and after disruptions. The controls in this family address plan development (CP-2), training (CP-3), testing (CP-4), backup and restoration (CP-9), and alternate processing and storage sites (CP-6, CP-7).
IA — Identification and Authentication (13 base controls)
The IA family governs how users and devices prove their identities. It covers password management, multi-factor authentication (MFA), cryptographic authentication, and identity proofing. With the rise of zero-trust architectures, these controls have become increasingly central to federal cybersecurity strategies.
IR — Incident Response (10 base controls)
Incident Response controls require organizations to detect, report, and respond to security incidents effectively. The family covers response plan development (IR-1), training (IR-2), testing (IR-3), incident handling procedures (IR-4), and coordination with external organizations (IR-6). In fact, having a documented, tested incident response plan is a baseline requirement at all impact levels.
MA — Maintenance (7 base controls)
The Maintenance control family addresses system maintenance activities, including maintenance tools, nonlocal (remote) maintenance, and maintenance over personnel. While smaller in scope, MA controls ensure that routine maintenance activities do not introduce security vulnerabilities.
MP — Media Protection (8 base controls)
Media Protection governs how organizations handle, sanitize, and dispose of physical and digital media. With controls covering media access, marking, storage, transport, and destruction, this family is often most relevant for organizations that handle classified or sensitive information.
PE — Physical and Environmental Protection (23 base controls)
This large family addresses physical facility security. Its controls cover physical access control, visitor management, monitoring, and emergency shutoff. In addition, the family includes power equipment, temperature and humidity controls, and fire protection. Any organization operating its own data center or server rooms must implement PE controls.
PL — Planning (11 base controls)
The Planning family requires organizations to develop and maintain security and privacy plans for each system. Notable PL controls address plan development (PL-2), rules of behavior (PL-4), and security architecture documentation (PL-8).
PM — Program Management (32 base controls)
Program Management is the second-largest family by base control count. It addresses organization-wide security program requirements, including the information security program plan (PM-1), assignment of senior officials (PM-2), risk strategy (PM-9), and enterprise architecture (PM-7). Importantly, PM controls operate at the organizational level rather than the system level.
PS — Personnel Security (9 base controls)
Personnel Security covers the entire employee lifecycle as it relates to security, including screening before hiring, access agreements, termination procedures, and personnel transfers. These controls ensure that people with access to systems are trustworthy and that privileges are revoked promptly whenever roles change.
PT — Personally Identifiable Information Processing and Transparency (8 base controls, NEW in Rev 5)
Introduced in Rev 5, the PT family establishes requirements for handling personally identifiable information (PII). It covers authority to process PII, purpose specification, consent, privacy notices, and data minimization. Previously, Rev 4 addressed these topics in Appendix J. However, Rev 5 incorporated them directly into the main catalog.
RA — Risk Assessment (10 base controls)
The Risk Assessment family requires organizations to identify risks, perform vulnerability scanning, and determine risk responses. Here, RA-2 (Security Categorization) is especially significant. It mandates that organizations categorize their systems using FIPS 199, which directly determines the applicable control baseline.
SA — System and Services Acquisition (24 base controls)
The SA family addresses security throughout the system development lifecycle and in third-party acquisitions. For example, controls cover developer testing, security engineering principles, and outsourced information system services. This family also includes supply chain considerations that complement the new SR family.
SC — System and Communications Protection (51 base controls)
SC is the largest control family in NIST 800-53 by base control count. It covers encryption, network boundary protection, segmentation, and cryptographic key management. It also addresses secure communication channels. Given the breadth of modern network architectures, this family spans a wide range of technical safeguards.
SI — System and Information Integrity (23 base controls)
The SI family focuses on maintaining the integrity of information and systems. Controls address flaw remediation (patching), malicious code protection, and security monitoring. In addition, this family covers software and firmware integrity verification and spam protection.
SR — Supply Chain Risk Management (12 base controls, NEW in Rev 5)
Also introduced in Rev 5, the SR family addresses supply chain risk assessment, acquisition strategies, and component provenance. It also covers authenticity verification. This family responds to growing threats targeting hardware and software supply chains. As a result, it provides a structured approach to managing third-party risk.
Security vs Privacy: How the Control Families Map
NIST 800-53 Rev 5 integrates privacy controls directly into the catalog alongside security controls. Previously, Rev 4 isolated them in Appendix J. This shift reflects the reality that security and privacy are deeply interconnected. As a result, most families now contain both types of controls.
Understanding which families lean toward security, privacy, or both helps organizations assign the right reviewers during implementation. For instance, a CISO and a Chief Privacy Officer (CPO) might focus on different families during a compliance assessment.
However, a universal security-versus-privacy map may not suit every organization. Instead, a custom approach tends to add more value. In this approach, controls are identified, mapped, and configured for a specific environment.
How Control Families Map to Baselines (Low, Moderate, High)
NIST SP 800-53B defines three control baselines based on system impact level: Low, Medium, and High. However, not every control in every family applies to every system. Determined by FIPS 199 categorization, these baselines tell organizations exactly which controls from each family they must implement.
The three baselines differ significantly in control counts:
- Low baseline (149 controls): For systems where a breach would have a limited adverse effect.
- Moderate baseline (287 controls): For systems where a compromise could cause serious harm. Examples include significant operational disruption, financial loss, or harm to individuals. Notably, Moderate is the most commonly applied baseline across federal agencies and higher education institutions.
- High baseline (370 controls): For systems where a compromise could result in severe or catastrophic consequences, including mission failure or widespread harm.
Most of the 20 control families contribute controls to all three baselines. However, the number of required controls from each family increases at higher impact levels. Importantly, higher baselines do not introduce new control families. Instead, they require additional controls and enhancements within the same families to address increased risk.
The Program Management (PM) and Personally Identifiable Information Processing and Transparency (PT) families, however, are not assigned directly to the Low, Moderate or High baselines in SP 800-53B. Instead, these controls are selected based on organization-wide governance needs or system specific privacy requirements.
| Family | Low | Moderate | High |
| AC (Access Control) | 10 | 17 | 21 |
| AU (Audit and Accountability) | 6 | 12 | 14 |
| CM (Configuration Management) | 6 | 11 | 13 |
| IA (Identification and Authentication) | 7 | 10 | 11 |
| SC (System and Communications Protection) | 10 | 22 | 32 |
| All 20 families (total) | 149 | 287 | 370 |
Notably, the jump in required controls from Low to Moderate is substantial—nearly double. The jump from Moderate to High might seem smaller, but it still adds 95 controls total. While organizations subject to FISMA must match their baseline to their FIPS 199 categorization, voluntary adopters—such as private-sector organizations using NIST 800-53 as a best-practice framework—can tailor baselines to their specific risk environment.
Notably, the jump from Low to Moderate is substantial — nearly double. The jump from Moderate to High seems smaller but still adds 95 controls. Organizations subject to FISMA must match their baseline to their FIPS 199 categorization. However, voluntary adopters can tailor baselines to their specific risk environment.
How to Simplify NIST 800-53 Control Family Mapping
Mapping controls across 20 families is demanding, especially when multiple baselines, departments, and compliance timelines are involved. Isora GRC gives security teams one shared workspace to assess, track, and report on NIST 800-53 controls at scale.
Questionnaires & Surveys: Distribute control-family-aligned questionnaires to unit-level owners across your organization. Respondents attach evidence directly within their answers, building an audit trail without scattered files.
Assessment Management: Organize assessments by control family, baseline level, or compliance goal. Track completion rates in real time across departments, campuses, or business units.
Reports & Scorecards: Generate compliance scorecards that show control coverage across all 20 families. Automated scoring helps teams identify gaps and prioritize remediation for FISMA audits, FedRAMP assessments, or internal reviews.
See how Isora GRC simplifies NIST 800-53 compliance.
NIST 800-53 Control Families FAQs
How many control families are in NIST 800-53?
NIST 800-53 Rev 5 contains 20 control families, up from 18 in Rev 4. The two new families added in Rev 5 are PT (Personally Identifiable Information Processing and Transparency) and SR (Supply Chain Risk Management). Together, these 20 families organize the catalog’s 1,196 security and privacy controls.
What are the 20 control families in NIST 800-53?
The 20 families are: AC (Access Control), AT (Awareness and Training), AU (Audit and Accountability), CA (Assessment, Authorization, and Monitoring), CM (Configuration Management), CP (Contingency Planning), IA (Identification and Authentication), IR (Incident Response), MA (Maintenance), MP (Media Protection), PE (Physical and Environmental Protection), PL (Planning), PM (Program Management), PS (Personnel Security), PT (Personally Identifiable Information Processing and Transparency), RA (Risk Assessment), SA (System and Services Acquisition), SC (System and Communications Protection), SI (System and Information Integrity) and SR (Supply Chain Risk Management). Each two-letter abbreviation represents a distinct security or privacy domain.
What are the two new control families added in Rev. 5?
PT (Personally Identifiable Information Processing and Transparency) contains 8 base controls addressing PII handling, consent and data minimization. SR (Supply Chain Risk Management) contains 12 base controls addressing supply chain risk assessment, component provenance and authenticity. PT formalized privacy requirements that previously lived in Rev 4’s Appendix J, while SR responded to escalating supply chain threats.
What is the largest control family?
SC (System and Communications Protection) is the largest family with 51 base controls. It covers encryption, network boundary protection, segmentation, and cryptographic key management. AC (Access Control) is the broadest in scope with 25 base controls plus numerous enhancements, making it one of the most implementation-intensive families.
Does every control family apply to every organization?
No. Which controls within each family apply depends on the system’s impact level (Low, Moderate, or High) as defined by FIPS 199 and the corresponding baselines in SP 800-53B. Organizations can further tailor their control selections based on risk assessment results and regulatory requirements such as FISMA or FedRAMP.
How do control families relate to FedRAMP?
FedRAMP uses NIST 800-53 control families as its foundation with added parameters and requirements on top of the standard baselines. Cloud Service Providers (CSPs) pursuing FedRAMP authorization must implement controls from all 20 families at their designated authorization level (Low, Moderate, or High).
How do control families relate to CMMC?
The Cybersecurity Maturity Model Certification (CMMC) framework is also derived from NIST 800-53 via NIST SP 800-171. Organizations pursuing CMMC certification often find that many required practices map directly to NIST 800-53 control families, particularly in areas such as access control incident response and system integrity.
Is asset management covered in NIST 800-53?
Yes. The CM (Configuration Management) family addresses asset management through CM-8 (System Component Inventory), which requires organizations to maintain a comprehensive inventory of hardware, software, and firmware components, and CM-9 (Configuration Management Plan). The RA (Risk Assessment) family also requires asset identification as part of the risk identification process.
Key Takeaways
The 20 NIST 800-53 control families organize 1,196 security and privacy controls into a navigable structure that scales from small agencies to large federal departments. Whether implementing at the Low baseline (149 controls) or the High baseline (370 controls), the family structure is the best roadmap for understanding what the framework requires and where compliance gaps lie.
For a comprehensive introduction to the framework beyond control families, check out our complete guide to NIST 800-53.
Ready to streamline compliance across all 20 families? See how Isora GRC helps security teams manage NIST 800-53 at scale.
This content is for informational purposes only and does not constitute legal or compliance advice. See our full disclaimer.

