NIST 800-53 Compliance Guides
Comprehensive DSMP guides for NIST 800-53 compliance and federal information security requirements.
Available Guides
Loading guides for NIST 800-53...
Snowflake API Keys & Secrets Detection
Learn how to detect API keys, secrets, and tokens in Snowflake environments. Follow step-by-step guidance for NIST 800-53 compliance.
AWS Configuration Files Detection
Learn how to detect configuration files in AWS environments. Follow step-by-step guidance for NIST 800-53 compliance and configuration management security.
Azure Configuration Files Detection
Learn how to detect configuration files in Azure environments. Follow step-by-step guidance for NIST 800-53 compliance.
GCP Configuration Files Detection
Learn how to detect configuration files in Google Cloud Platform environments. Follow step-by-step guidance for NIST 800-53 compliance.
Snowflake Password Detection
Learn how to detect passwords in Snowflake environments. Follow step-by-step guidance for NIST 800-53 compliance.
Azure API Keys & Secrets Exposure Remediation
Learn how to fix exposed API keys, secrets, and tokens in Azure environments. Follow step-by-step guidance for NIST 800-53 compliance.
Databricks API Keys & Secrets Remediation
Learn how to fix exposed API keys, secrets, and tokens in Databricks environments. Follow step-by-step guidance for NIST 800-53 compliance.
Snowflake Password Exposure Remediation
Learn how to fix password exposures in Snowflake environments. Follow step-by-step guidance for NIST 800-53 compliance.
AWS API Keys & Secrets Prevention
Learn how to prevent exposure of API keys, secrets, and tokens in AWS environments. Follow step-by-step guidance for NIST 800-53 compliance.
GCP Audit Logs Exposure Prevention
Learn how to prevent exposure of audit logs in Google Cloud Platform environments. Follow step-by-step guidance for NIST 800-53 compliance.
Azure Configuration Files Exposure Prevention
Learn how to prevent exposure of configuration files in Azure environments. Follow step-by-step guidance for NIST 800-53 compliance and secure configuration management.
Databricks Configuration File Protection
Learn how to prevent exposure of configuration files in Databricks environments. Follow step-by-step guidance for NIST 800-53 compliance.
GCP Configuration Files Exposure Prevention
Learn how to prevent exposure of configuration files in Google Cloud Platform environments. Follow step-by-step guidance for NIST 800-53 compliance.
Snowflake Password Exposure Prevention
Learn how to prevent password exposure in Snowflake environments. Follow step-by-step guidance for NIST 800-53 compliance and secure authentication.
About NIST 800-53
NIST Special Publication 800-53 provides a catalog of security and privacy controls for federal information systems and organizations. The framework includes controls for low-impact, moderate-impact, and high-impact systems, with detailed guidance on control implementation, assessment, and monitoring. NIST 800-53 serves as the foundation for FedRAMP and other federal security programs. These guides help you implement the security controls required for NIST 800-53 compliance.
Access Control (AC)
- Account management and access enforcement
- Least privilege and separation of duties
- Remote access and session controls
- Information flow enforcement
System & Communications Protection (SC)
- Boundary protection and network controls
- Cryptographic protection and key management
- Collaborative computing and VoIP controls
- Transmission confidentiality and integrity
System & Information Integrity (SI)
- Flaw remediation and malicious code protection
- Information system monitoring and logging
- Security function verification
- Error handling and information handling