{"profile":{"uuid":"f47ac10b-58cc-4372-a567-0e02b2c3d479","metadata":{"roles":[{"id":"creator","title":"Document Creator"},{"id":"contact","title":"Contact"}],"title":"NIST Special Publication 800-53 Revision 5.1.1 MODERATE IMPACT BASELINE","parties":[{"name":"Joint Task Force, Transformation Initiative","type":"organization","uuid":"cde369ce-57f8-4ec1-847f-2681a9a881e7","addresses":[{"city":"Gaithersburg","state":"MD","addr-lines":["National Institute of Standards and Technology","Attn: Computer Security Division","Information Technology Laboratory","100 Bureau Drive (Mail Stop 8930)"],"postal-code":"20899-8930"}],"email-addresses":["sec-cert@nist.gov"]}],"version":"5.1.1+u4","document-ids":[{"scheme":"http://oscal.io/oscal/identifier/content-uuid","identifier":"fbaf8f1f-716c-4e74-af6f-37cd8703d843"}],"last-modified":"2024-02-04T23:16:00.000000-00:00","oscal-version":"1.1.2","responsible-parties":[{"role-id":"creator","party-uuids":["cde369ce-57f8-4ec1-847f-2681a9a881e7"]},{"role-id":"contact","party-uuids":["cde369ce-57f8-4ec1-847f-2681a9a881e7"]}]},"imports":[{"href":"#84cbf061-eb87-4ec1-8112-1f529232e907","include-controls":[{"with-ids":["ac-1","ac-2","ac-2.1","ac-2.2","ac-2.3","ac-2.4","ac-2.5","ac-2.13","ac-3","ac-4","ac-5","ac-6","ac-6.1","ac-6.2","ac-6.5","ac-6.7","ac-6.9","ac-6.10","ac-7","ac-8","ac-11","ac-11.1","ac-12","ac-14","ac-17","ac-17.1","ac-17.2","ac-17.3","ac-17.4","ac-18","ac-18.1","ac-18.3","ac-19","ac-19.5","ac-20","ac-20.1","ac-20.2","ac-21","ac-22","at-1","at-2","at-2.2","at-2.3","at-3","at-4","au-1","au-2","au-3","au-3.1","au-4","au-5","au-6","au-6.1","au-6.3","au-7","au-7.1","au-8","au-9","au-9.4","au-11","au-12","ca-1","ca-2","ca-2.1","ca-3","ca-5","ca-6","ca-7","ca-7.1","ca-7.4","ca-9","cm-1","cm-2","cm-2.2","cm-2.3","cm-2.7","cm-3","cm-3.2","cm-3.4","cm-4","cm-4.2","cm-5","cm-6","cm-7","cm-7.1","cm-7.2","cm-7.5","cm-8","cm-8.1","cm-8.3","cm-9","cm-10","cm-11","cm-12","cm-12.1","cp-1","cp-2","cp-2.1","cp-2.3","cp-2.8","cp-3","cp-4","cp-4.1","cp-6","cp-6.1","cp-6.3","cp-7","cp-7.1","cp-7.2","cp-7.3","cp-8","cp-8.1","cp-8.2","cp-9","cp-9.1","cp-9.8","cp-10","cp-10.2","ia-1","ia-2","ia-2.1","ia-2.2","ia-2.8","ia-2.12","ia-3","ia-4","ia-4.4","ia-5","ia-5.1","ia-5.2","ia-5.6","ia-6","ia-7","ia-8","ia-8.1","ia-8.2","ia-8.4","ia-11","ia-12","ia-12.2","ia-12.3","ia-12.5","ir-1","ir-2","ir-3","ir-3.2","ir-4","ir-4.1","ir-5","ir-6","ir-6.1","ir-6.3","ir-7","ir-7.1","ir-8","ma-1","ma-2","ma-3","ma-3.1","ma-3.2","ma-3.3","ma-4","ma-5","ma-6","mp-1","mp-2","mp-3","mp-4","mp-5","mp-6","mp-7","pe-1","pe-2","pe-3","pe-4","pe-5","pe-6","pe-6.1","pe-8","pe-9","pe-10","pe-11","pe-12","pe-13","pe-13.1","pe-14","pe-15","pe-16","pe-17","pl-1","pl-2","pl-4","pl-4.1","pl-8","pl-10","pl-11","ps-1","ps-2","ps-3","ps-4","ps-5","ps-6","ps-7","ps-8","ps-9","ra-1","ra-2","ra-3","ra-3.1","ra-5","ra-5.2","ra-5.5","ra-5.11","ra-7","ra-9","sa-1","sa-2","sa-3","sa-4","sa-4.1","sa-4.2","sa-4.9","sa-4.10","sa-5","sa-8","sa-9","sa-9.2","sa-10","sa-11","sa-15","sa-15.3","sa-22","sc-1","sc-2","sc-4","sc-5","sc-7","sc-7.3","sc-7.4","sc-7.5","sc-7.7","sc-7.8","sc-8","sc-8.1","sc-10","sc-12","sc-13","sc-15","sc-17","sc-18","sc-20","sc-21","sc-22","sc-23","sc-28","sc-28.1","sc-39","si-1","si-2","si-2.2","si-3","si-4","si-4.2","si-4.4","si-4.5","si-5","si-7","si-7.1","si-7.7","si-8","si-8.2","si-10","si-11","si-12","si-16","sr-1","sr-2","sr-2.1","sr-3","sr-5","sr-6","sr-8","sr-10","sr-11","sr-11.1","sr-11.2","sr-12"]}]}],"merge":{"as-is":true},"back-matter":{"resources":[{"uuid":"84cbf061-eb87-4ec1-8112-1f529232e907","rlinks":[{"href":"https://raw.githubusercontent.com/usnistgov/oscal-content/refs/heads/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_catalog.json","media-type":"application/oscal.catalog+json"}],"description":"NIST Special Publication 800-53 Revision 5: Security and Privacy Controls for Federal Information Systems and Organizations"}]}}}