Overview
NIST Special Publication 800-53 provides a comprehensive catalog of security and privacy controls for federal information systems and organizations. Developed by the National Institute of Standards and Technology (NIST), this framework is widely adopted by government agencies and private sector organizations for risk management and security control implementation. Wazuh helps organizations monitor and assess NIST 800-53 control effectiveness through security event correlation and automated monitoring.NIST 800-53 Controls Coverage
Wazuh maps security events to NIST 800-53 controls through therule.nist_800_53 field. The compliance requirements are defined in:
Source: plugins/main/common/compliance-requirements/nist-requirements.ts
Control Families
Access Control (AC)
AC.2 - Account Management
AC.2 - Account Management
- Define authorized account types
- Assign account managers
- Establish account conditions
- Monitor account usage
- Authorize access appropriately
- Review accounts periodically
- Remove or disable unnecessary accounts
- Account creation events
- Account deletion/disabling events
- Account modification alerts
- Privileged account usage
- Account lifecycle violations
AC.6 - Least Privilege
AC.6 - Least Privilege
- Implement least privilege access
- Restrict privileged functions
- Audit privileged operations
- Review privilege assignments
- Limit elevated privileges
- Privilege escalation attempts
- Unnecessary privilege usage
- Privileged command execution
- Access control violations
- Sudo and su command usage
AC.7 - Unsuccessful Logon Attempts
AC.7 - Unsuccessful Logon Attempts
- Define maximum failed attempts
- Implement account lockout
- Set lockout duration
- Log failed attempts
- Alert on brute force patterns
- Failed authentication events
- Account lockout events
- Brute force attack patterns
- Multiple failed login attempts
AC.12 - Session Termination
AC.12 - Session Termination
- Define session timeout periods
- Implement automatic logout
- Terminate inactive sessions
- Log session events
- Session timeout events
- Inactive session detection
- Session termination logs
- Long-running session alerts
Audit and Accountability (AU)
AU.5 - Response to Audit Processing Failures
AU.5 - Response to Audit Processing Failures
- Define audit failure conditions
- Identify personnel to alert
- Specify failure response actions
- Monitor audit system health
- Prevent audit loss
- Audit system failures
- Log storage capacity issues
- Logging service failures
- Audit record loss
AU.6 - Audit Review, Analysis, and Reporting
AU.6 - Audit Review, Analysis, and Reporting
- Review audit records regularly
- Analyze for security incidents
- Report findings appropriately
- Identify unusual activity patterns
- Integrate with incident response
- All security events
- Anomalous activity patterns
- Security incident indicators
- Compliance violations
AU.8 - Time Stamps
AU.8 - Time Stamps
- Synchronize system clocks
- Use authoritative time sources
- Generate accurate timestamps
- Maintain time correlation
- Protect time synchronization mechanisms
- Time synchronization failures
- Clock skew detection
- NTP service status
- Time source availability
AU.9 - Protection of Audit Information
AU.9 - Protection of Audit Information
- Restrict audit log access
- Protect audit tools
- Prevent log tampering
- Monitor audit system access
- Implement log integrity controls
- Unauthorized log access
- Audit file modifications
- Audit tool tampering
- Log deletion attempts
AU.12 - Audit Generation
AU.12 - Audit Generation
- Define auditable events
- Implement audit record generation
- Allow selective auditing
- Capture required audit data
- Support forensic analysis
- All system security events
- Configurable event monitoring
- Custom rule generation
Security Assessment and Authorization (CA)
CA.3 - System Interconnections
CA.3 - System Interconnections
- Document system interconnections
- Authorize connections
- Define security requirements
- Monitor connection usage
- Review agreements regularly
- Unauthorized network connections
- New system interconnections
- Unusual network traffic
- Inter-system communication
Configuration Management (CM)
CM.1 - Configuration Management Policy and Procedures
CM.1 - Configuration Management Policy and Procedures
- Establish CM policy
- Define CM procedures
- Document configuration standards
- Review and update regularly
- Disseminate to stakeholders
- Configuration changes
- Policy violations
- Unauthorized modifications
CM.3 - Configuration Change Control
CM.3 - Configuration Change Control
- Define configuration items
- Establish change control process
- Review change requests
- Document changes
- Test changes before implementation
- Track configuration baselines
- System configuration changes
- Unauthorized modifications
- Configuration baseline deviations
- Change control violations
CM.5 - Access Restrictions for Change
CM.5 - Access Restrictions for Change
- Restrict change access
- Define authorized personnel
- Enforce change controls
- Monitor change activities
- Audit configuration changes
- Unauthorized change attempts
- Configuration modification events
- Access control violations during changes
Identification and Authentication (IA)
IA.4 - Identifier Management
IA.4 - Identifier Management
- Authorize identifier assignment
- Select unique identifiers
- Prevent identifier reuse
- Disable inactive identifiers
- Monitor identifier lifecycle
- Identifier creation/deletion
- Duplicate identifier detection
- Inactive identifier usage
- Unauthorized identifier changes
IA.5 - Authenticator Management
IA.5 - Authenticator Management
- Verify identity before issuing
- Establish authenticator strength
- Protect authenticator content
- Change default authenticators
- Implement password policies
- Monitor authenticator compromise
- Weak password usage
- Default credential usage
- Authenticator changes
- Compromised credential detection
IA.10 - Adaptive Identification and Authentication
IA.10 - Adaptive Identification and Authentication
- Define high-risk scenarios
- Implement adaptive authentication
- Require additional factors when needed
- Monitor authentication context
- Adjust security based on risk
- High-risk access attempts
- Geographic anomalies
- Unusual access patterns
- Multi-factor authentication events
System and Services Acquisition (SA)
SA.11 - Developer Security Testing and Evaluation
SA.11 - Developer Security Testing and Evaluation
- Require security testing
- Define assessment criteria
- Review test results
- Address identified flaws
- Conduct penetration testing
- Application security events
- Code vulnerability exploitation
- Security testing activities
- Flaw remediation tracking
System and Communications Protection (SC)
SC.2 - Application Partitioning
SC.2 - Application Partitioning
- Separate user and admin functions
- Implement role-based interfaces
- Restrict management access
- Monitor privilege usage
- Management function access
- Privilege usage patterns
- Separation violations
SC.7 - Boundary Protection
SC.7 - Boundary Protection
- Define security boundaries
- Implement boundary controls
- Monitor boundary traffic
- Control information flows
- Deploy managed interfaces
- Boundary crossing attempts
- Firewall events
- Network perimeter violations
- Unauthorized external connections
SC.8 - Transmission Confidentiality and Integrity
SC.8 - Transmission Confidentiality and Integrity
- Implement encryption for transmission
- Use secure protocols
- Protect data in transit
- Verify transmission integrity
- Prevent interception
- Unencrypted transmissions
- Insecure protocol usage
- Man-in-the-middle attempts
- Data transmission integrity failures
System and Information Integrity (SI)
SI.2 - Flaw Remediation
SI.2 - Flaw Remediation
- Identify system flaws
- Report vulnerabilities
- Test patches and updates
- Install updates timely
- Verify remediation effectiveness
- Track flaw remediation
- Vulnerability detection
- Missing patch detection
- Unpatched system identification
- Exploitation attempts on known flaws
SI.3 - Malicious Code Protection
SI.3 - Malicious Code Protection
- Deploy anti-malware solutions
- Update malware signatures
- Scan files and downloads
- Monitor for malicious activity
- Quarantine detected threats
- Configure automatic updates
- Malware detection events
- Anti-virus status
- Signature update failures
- Malicious code execution
- Ransomware activity
SI.7 - Software, Firmware, and Information Integrity
SI.7 - Software, Firmware, and Information Integrity
- Implement integrity monitoring
- Define critical files
- Detect unauthorized changes
- Alert on integrity violations
- Use cryptographic hashes
- Verify code signatures
- File integrity violations
- Unauthorized file modifications
- System file changes
- Critical file alterations
Using the NIST 800-53 Dashboard
Accessing NIST 800-53 Compliance View
Review Control Families
Dashboard Components
The NIST 800-53 dashboard includes:- Top controls by alert count - Identifies controls with most violations
- Control family distribution - Shows coverage across control families
- Control effectiveness metrics - Tracks control implementation success
- Compliance trend analysis - Historical view of control adherence
plugins/main/public/components/overview/nist/dashboards/dashboard-panels.ts
Data Source Implementation
The NIST 800-53 data source filters events by therule.nist_800_53 field:
plugins/main/public/components/common/data-source/pattern/events/nist-800-53/nist-800-53-data-source.ts:5
Event Columns
NIST 800-53 events table displays:- Timestamp
- Rule description
- NIST 800-53 control (
rule.nist_800_53field) - Alert level
- Control family
- Agent information
plugins/main/public/components/overview/nist/events/nist-columns.tsx:8
Compliance Reporting for NIST 800-53
Control Naming Convention
NIST 800-53 controls follow the pattern[FAMILY].[NUMBER]:
- AC.2 - Access Control family, control #2
- AU.6 - Audit and Accountability family, control #6
- SI.7 - System and Information Integrity family, control #7
Generating NIST 800-53 Reports
Control Baselines
NIST 800-53 defines three security control baselines:- Low-Impact Systems
- Moderate-Impact Systems
- High-Impact Systems
- AC.2, AC.7, AU.6, AU.8, SI.3, SI.7
Continuous Monitoring
NIST 800-53 requires continuous monitoring of security controls. Wazuh provides:Real-time Control Assessment
Automated Reporting
Deviation Detection
Trend Analysis
Integration with Risk Management Framework (RMF)
Wazuh supports NIST RMF phases:| RMF Step | Wazuh Support |
|---|---|
| Categorize | Identify system impact level for control selection |
| Select | Map Wazuh rules to required NIST 800-53 controls |
| Implement | Deploy monitoring for implemented controls |
| Assess | Use Wazuh data to assess control effectiveness |
| Authorize | Provide evidence for authorization decision |
| Monitor | Continuous monitoring through real-time alerting |
Control Overlays and Tailoring
Wazuh supports monitoring for various NIST 800-53 overlays:- Privacy Overlay - Controls for protecting PII
- Cloud Computing Overlay - Controls for cloud environments
- Industrial Control Systems (ICS) Overlay - Controls for SCADA/ICS
Crosswalk with Other Frameworks
NIST 800-53 maps to other frameworks monitored by Wazuh:| NIST 800-53 | PCI DSS | HIPAA | GDPR |
|---|---|---|---|
| AU.9 | 10.5.2 | - | IV_32.2 |
| SI.7 | 11.5 | 164.312.c.2 | II_5.1.f |
| SI.3 | 5.1, 5.2 | - | IV_35.7.d |
| AC.7 | 8.1.6 | 164.312.a.2.I | IV_32.2 |
plugins/main/common/dashboards/dashboard-definitions/overview/nist/vis-states.ts:1051
Requirement Data Structure
The complete NIST 800-53 requirements mapping:plugins/main/common/compliance-requirements/nist-requirements.ts:12
Best Practices
Focus on Your Baseline
Enable FIM for SI.7
Continuous Monitoring
Control Tailoring
Integration with POA&M
Regular Assessments
Related Documentation
- Compliance Overview
- [File Integrity Monitoring(/modules/file-integrity-monitoring) - Implements SI.7
- [Log Analysis(/modules/threat-hunting) - Implements AU.6
- [Vulnerability Detection(/modules/vulnerability-detection) - Supports SI.2
- [Incident Response(/guides/threat-analysis) - Supports IR family controls