{"profile":{"uuid":"7eca4589-7ed9-4552-9da6-738126660be3","metadata":{"roles":[{"id":"creator","title":"Document Creator"},{"id":"contact","title":"Contact"}],"title":"NIST Special Publication 800-53 Revision 5.1.1 LOW IMPACT BASELINE","parties":[{"name":"Joint Task Force, Transformation Initiative","type":"organization","uuid":"984e6c07-b5b6-4ab6-b22b-283609c325e6","addresses":[{"city":"Gaithersburg","state":"MD","addr-lines":["National Institute of Standards and Technology","Attn: Computer Security Division","Information Technology Laboratory","100 Bureau Drive (Mail Stop 8930)"],"postal-code":"20899-8930"}],"email-addresses":["sec-cert@nist.gov"]}],"version":"5.1.1+u4","document-ids":[{"scheme":"http://oscal.io/oscal/identifier/content-uuid","identifier":"0eac56d1-ae87-4fea-906e-e49bce7cd4b2"}],"last-modified":"2024-02-04T23:16:00.000000-00:00","oscal-version":"1.1.2","responsible-parties":[{"role-id":"creator","party-uuids":["984e6c07-b5b6-4ab6-b22b-283609c325e6"]},{"role-id":"contact","party-uuids":["984e6c07-b5b6-4ab6-b22b-283609c325e6"]}]},"imports":[{"href":"#84cbf061-eb87-4ec1-8112-1f529232e907","include-controls":[{"with-ids":["ac-1","ac-2","ac-3","ac-7","ac-8","ac-14","ac-17","ac-18","ac-19","ac-20","ac-22","at-1","at-2","at-2.2","at-3","at-4","au-1","au-2","au-3","au-4","au-5","au-6","au-8","au-9","au-11","au-12","ca-1","ca-2","ca-3","ca-5","ca-6","ca-7","ca-7.4","ca-9","cm-1","cm-2","cm-4","cm-5","cm-6","cm-7","cm-8","cm-10","cm-11","cp-1","cp-2","cp-3","cp-4","cp-9","cp-10","ia-1","ia-2","ia-2.1","ia-2.2","ia-2.8","ia-2.12","ia-4","ia-5","ia-5.1","ia-6","ia-7","ia-8","ia-8.1","ia-8.2","ia-8.4","ia-11","ir-1","ir-2","ir-4","ir-5","ir-6","ir-7","ir-8","ma-1","ma-2","ma-4","ma-5","mp-1","mp-2","mp-6","mp-7","pe-1","pe-2","pe-3","pe-6","pe-8","pe-12","pe-13","pe-14","pe-15","pe-16","pl-1","pl-2","pl-4","pl-4.1","pl-10","pl-11","ps-1","ps-2","ps-3","ps-4","ps-5","ps-6","ps-7","ps-8","ps-9","ra-1","ra-2","ra-3","ra-3.1","ra-5","ra-5.2","ra-5.11","ra-7","sa-1","sa-2","sa-3","sa-4","sa-4.10","sa-5","sa-8","sa-9","sa-22","sc-1","sc-5","sc-7","sc-12","sc-13","sc-15","sc-20","sc-21","sc-22","sc-39","si-1","si-2","si-3","si-4","si-5","si-12","sr-1","sr-2","sr-2.1","sr-3","sr-5","sr-8","sr-10","sr-11","sr-11.1","sr-11.2","sr-12"]}]}],"merge":{"as-is":true},"back-matter":{"resources":[{"uuid":"84cbf061-eb87-4ec1-8112-1f529232e907","rlinks":[{"href":"../../../../nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_catalog.xml","media-type":"application/oscal.catalog+xml"},{"href":"../../../../nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_catalog.json","media-type":"application/oscal.catalog+json"},{"href":"../../../../nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_catalog.yaml","media-type":"application/oscal.catalog+yaml"}],"description":"NIST Special Publication 800-53 Revision 5: Security and Privacy Controls for Federal Information Systems and Organizations"}]}}}