Overview
NIST Special Publication 800-53 Revision 5 provides a comprehensive catalog of security and privacy controls for information systems and organizations. Nabla’s automated assessment analyzes your infrastructure-as-code (IaC) to evaluate compliance against key NIST 800-53 controls.Framework Details
- Framework: NIST 800-53
- Version: Revision 5
- Baseline: Moderate (expandable to Low/High)
- Output Format: OSCAL Assessment Results (JSON)
Assessed Control Families
Access Control (AC)
| Control | Title | Assessment Method |
|---|---|---|
| AC-2 | Account Management | Detects IAM users, roles, and groups |
| AC-3 | Access Enforcement | Evaluates IAM policies and security groups |
| AC-4 | Information Flow Enforcement | Analyzes network controls (VPCs, subnets, NACLs) |
| AC-6 | Least Privilege | Identifies overly permissive wildcard (*) policies |
Audit and Accountability (AU)
| Control | Title | Assessment Method |
|---|---|---|
| AU-2 | Event Logging | Detects CloudTrail, CloudWatch, S3 bucket logging |
| AU-9 | Protection of Audit Information | Verifies log storage encryption and versioning |
Security Assessment and Authorization (CA)
| Control | Title | Assessment Method |
|---|---|---|
| CA-7 | Continuous Monitoring | Identifies CloudWatch alarms, AWS Config, GuardDuty |
Configuration Management (CM)
| Control | Title | Assessment Method |
|---|---|---|
| CM-2 | Baseline Configuration | Infrastructure-as-code represents versioned baselines |
Contingency Planning (CP)
| Control | Title | Assessment Method |
|---|---|---|
| CP-9 | System Backup | Detects AWS Backup vaults/plans, database backup retention |
Identification and Authentication (IA)
| Control | Title | Assessment Method |
|---|---|---|
| IA-2 | Identification and Authentication | Analyzes IAM users, roles, Cognito user pools |
| IA-5 | Authenticator Management | Detects access keys, login profiles, Cognito domains |
System and Communications Protection (SC)
| Control | Title | Assessment Method |
|---|---|---|
| SC-7 | Boundary Protection | Evaluates security groups, NACLs, VPCs |
| SC-8 | Transmission Confidentiality | Verifies HTTPS listeners, S3 encryption in transit |
| SC-13 | Cryptographic Protection | Identifies KMS keys and encryption mechanisms |
System and Information Integrity (SI)
| Control | Title | Assessment Method |
|---|---|---|
| SI-4 | System Monitoring | Detects CloudWatch, GuardDuty, AWS Config |
Evidence Collection
The assessor automatically extracts evidence from your infrastructure resources:Compliance Status
Each control is assigned one of three statuses:- Satisfied: Required controls are properly configured
- NotSatisfied: Controls are missing or misconfigured
- NotApplicable: Control cannot be assessed from IaC
Current Infrastructure Coverage
AWS-First Approach: The current implementation focuses on AWS resources as a starting point. We are actively expanding support for:
- Azure (azurerm_* resources)
- Google Cloud Platform (google_* resources)
- Kubernetes and container infrastructure
- Multi-cloud architectures
Supported AWS Resources
The assessor currently recognizes these AWS resource types: Identity & Access Managementaws_iam_user,aws_iam_role,aws_iam_groupaws_iam_policy,aws_iam_role_policy,aws_iam_policy_attachmentaws_iam_access_key,aws_iam_user_login_profileaws_cognito_user_pool,aws_cognito_user_pool_domain
aws_vpc,aws_subnet,aws_route_tableaws_security_group,aws_network_acl
aws_cloudtrail,aws_cloudwatch_log_group,aws_cloudwatch_metric_alarmaws_s3_bucket_logging,aws_flow_logaws_guardduty_detector,aws_config_configuration_recorder
aws_kms_key,aws_kms_aliasaws_s3_bucket_server_side_encryption_configuration
aws_backup_vault,aws_backup_planaws_db_instance(backup retention checks)
aws_lb_listener,aws_alb_listener
OSCAL Output Structure
Assessment results are returned in OSCAL 1.0.4 format:Example Assessment
Interpreting Results
Satisfied Controls
Controls marked as Satisfied indicate that:- Required infrastructure resources are present
- Security configurations meet baseline requirements
- Evidence was successfully extracted from IaC
Not Satisfied Controls
Controls marked as NotSatisfied may indicate:- Missing security controls (e.g., no CloudTrail logging)
- Misconfigured resources (e.g., overly permissive IAM policies)
- Weak cryptographic implementations
Findings
Each finding includes:- Control ID: Which control failed
- Description: What issue was detected
- Related Observations: Links to specific evidence
Limitations
Best Practices
- Combine with Manual Assessment: Use automated results as a starting point, not a complete assessment
- Review Findings: Each finding should be investigated in context of your architecture
- Track Over Time: Run assessments regularly to monitor compliance posture
- Supplement with Runtime Evidence: Consider integrating runtime security scanning
Related Frameworks
- NIST 800-171 - Protecting Controlled Unclassified Information
- NIST 800-172 - Enhanced Security Requirements
- FIPS 140-3 - Cryptographic Module Validation

