Nist 800 53 R4
30 community-sourced questions and answers. Free — no login.
AC-1
ACCESS CONTROL POLICY AND PROCEDURES
AC-2
ACCOUNT MANAGEMENT
AC-3
ACCESS ENFORCEMENT
AC-4
INFORMATION FLOW ENFORCEMENT
AC-5
SEPARATION OF DUTIES
AC-6
LEAST PRIVILEGE
AC-7
UNSUCCESSFUL LOGIN ATTEMPTS
AC-8
SYSTEM USE NOTIFICATION
AC-11
SESSION LOCK
AC-14
PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION
AC-17
REMOTE ACCESS
AC-18
WIRELESS ACCESS
AC-19
ACCESS CONTROL FOR MOBILE DEVICES
AC-20
USE OF EXTERNAL INFORMATION SYSTEMS
AC-22
PUBLICLY ACCESSIBLE CONTENT
AT-1
SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES
AT-2
SECURITY AWARENESS
AT-3
SECURITY TRAINING
AT-4
SECURITY TRAINING RECORDS
AU-1
AUDIT AND ACCOUNTABILITY POLICY AND PROCEDURES
AU-2
AUDITABLE EVENTS
AU-3
CONTENT OF AUDIT RECORDS
AU-4
AUDIT STORAGE CAPACITY
AU-5
RESPONSE TO AUDIT PROCESSING FAILURES
AU-6
AUDIT REVIEW, ANALYSIS, AND REPORTING
AU-7
AUDIT REDUCTION AND REPORT GENERATION
AU-8
TIME STAMPS
AU-9
PROTECTION OF AUDIT INFORMATION
AU-11
AUDIT RECORD RETENTION
AU-12
AUDIT GENERATION
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials