WHITEPAPER - NIST 800-53 COMPLIANCE
The following tables provide a summary of how LogRhythm supports the NIST 800-53 control requirements and enhancements. In
the specific control requirements or enhancements where a control is directly met, a specific LogRhythm feature (such as alarming,
correlating, or reporting) actually provides the required functionality to meet the control objective. In the specific control requirements
or enhancements which are designated as being augmented, LogRhythm features provide specific functionality which supports the
process to meet the control objective, but does not directly meet the control objective. The control requirements and enhancements
listed in the table below come directly from the NIST Special Publication 800-53 documentation located at the NIST Computer Security
Division web site (http://csrc.nist.gov/).
NIST 800-53 Control Requirement
Augments Control Process
Directly Meets Requirements
AC (Access Control)
AC-2.efh, AC-17.c, AC-18.b
AC-2.cij, AC-3, AC-5.ac, AC-6, AC-7.b, AC-17.b,
AC-20.a
AU (Audit and Accountability)
AU-5.a, AU-9, AU-11, AU-13
N/A
CA (Security Assessment and
Authorization)
N/A
CA-2.bc, CA-7.abcd
CM (Configuration Management )
CM-6.d
CM-3.e, CM-4, CM-5
CP (Contingency Planning)
N/A
CP-9.abc
IA (Identification and Authentication)
N/A
IA-2, IA-3, IA-8
IR (Incident Response)
IR-5
IR-4.a
MA (Maintenance)
N/A
MA-2.e
MP (Media Protection)
N/A
MP-2
PE (Physical and Environment Protection)
PE-6.ab
PE-3.c, PE-5
PS (Personnel Security)
PS-7.c
PS-4.a, PS-5
RA (Risk Assessment)
N/A
RA-5.ac
SA (System and Service Acquisition)
N/A
SA-7
SC (Systems and Communications
Protection)
SC-7.a
SC-5, SC-28
SI (System and Information Integrity)
SI-4.ab, SI-7, SI-11.a
SI-2.a, SI-3.abc, SI-8.a
WWW.LOGRHYTHM.COM
PAGE 2
WHITEPAPER - NIST 800-53 COMPLIANCE
NIST 800-53 Control Requirement
Augments Control Process
Directly Meets Requirements
AC (Access Control)
AC-2.(1)(4) (7.b), AC-17.(1)(5), AC-18.(2)
AC-2.(2)(3)(7.a), AC-7.(1), AC-17.(8)
AU (Audit and Accountability)
AU-5.(1)(2), AU-9.(2)(3)(4.ab)
N/A
CA (Security Assessment and
Authorization)
N/A
N/A
CM (Configuration Management )
CM-6.(3)
N/A
CP (Contingency Planning)
N/A
N/A
IA (Identification and Authentication)
N/A
N/A
IR (Incident Response)
IR-4.(1), IR-5(1)
IR-4.(3)(4)
MA (Maintenance)
N/A
N/A
MP (Media Protection)
N/A
MP-2.(1)
PE (Physical and Environment Protection)
PE-6.(1)(2)
PE-3.(3)
PS (Personnel Security)
N/A
N/A
RA (Risk Assessment)
N/A
N/A
SA (System and Service Acquisition)
N/A
N/A
SC (Systems and Communications
Protection)
N/A
SC-7.(5)(9)(12)
SI (System and Information Integrity)
SI-4.(2)(3)(4)(5)(8)(16)(17)
SI-3.(2)(3)(4)(5), SI-4.(11)(14)
The tables on the subsequent pages outline how LogRhythm supports requirements and enhancements of the NIST 800-53 sections.
The “How LogRhythm Supports Compliance” column describes the capabilities LogRhythm provides that directly meet or augment
support for NIST 800-53 compliance.
WWW.LOGRHYTHM.COM
PAGE 3
Please complete the form to gain access to this content