October 3, 2020. On September 23, 2020, the National Institute of Standards and Technology (NIST) published the final version of the draft of the fifth revision of Security and Privacy Controls for Information Systems and Organizations, also known as NIST SP 800-53-5, where SP means: Special Publication and 800 denotes series. The initial draft of the fifth revision was published over 4-1/2 years ago on February 23, 2016, and went through several draft revisions before the final version was published. The abstract of the NIST SP 800-53-5 as published by NIST is:

“This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural disasters, structural failures, foreign intelligence entities, and privacy risks. The controls are flexible and customizable and implemented as part of an organization-wide process to manage risk. The controls address diverse requirements derived from mission and business needs, laws, executive orders, directives, regulations, policies, standards, and guidelines. Finally, the consolidated control catalog addresses security and privacy from a functionality perspective (i.e., the strength of functions and mechanisms provided by the controls) and from an assurance perspective (i.e., the measure of confidence in the security or privacy capability provided by the controls). Addressing functionality and assurance helps to ensure that information technology products and the systems that rely on those products are sufficiently trustworthy.”

This 483 page document is an important and rich source of information for addressing HIPAA Administrative, Physical, and Technical Safeguards. CAIPHI has created a crosswalk that links NIST Cybersecurity Framework and NIST 800-53-5 guidance for security controls to each HIPAA Safeguard Standard and Implementation Specification in its mobile, cloud-based platform:  CyPHIcomply®. CyPHIcomply® is a data and documentation management tool for demonstrating compliance with the HIPAA Privacy, Security, and Breach Notification Rules. CAIPHI is updating the CyPHIcomply® crosswalk to reflect the September 20, 2020, release of the final version of NIST SP 800-53-5.  Attached to this post is an example of the update for the Technical Safeguard Access Control Standard Implementation Specification: 

Emergency access procedure (Required). Establish (and implement as needed) procedures for obtaining necessary electronic protected health information during an emergency.

Also, see a short 3-minute demonstration of the functionality of CyPHIcomply®at: WATCH.


1) This document is accessible online at: https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final. 


HIPAA Technical SafeguardsNIST SP 800-53-Rev.5NIST Cybersecurity Framework
SR TS 1.2
45 CFR 164.312(a)(2)(ii)
Emergency Access Procedure (R)
ID. BE-4
Dependencies and critical functions for delivery of critical services are established
CP-8
Telecommunication Services
PE-9
Power Equipment and Cabling
PE-11
Emergency Power
PM-8
Critical Infrastructure Plan
SA-14
Criticality Analysis
ID.BE-5
Resilience requirements to support delivery of critical services are established for all operating states (e.g., under duress/attack, during recovery, normal operations)
CP-2
Contingency Plan
CP-11
Alternate Communications Protocols
SA-13
Trustworthiness
SA-14
Criticality Analysis
PR.AC-1
Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users, and processes.
AC-1
Policies and Procedures
AC-2
Account Management
IA-1
Policy and Procedures
IA-2
Identification and Authentication (Organizational Users)
IA-3
Device Identification and Authentication
IA-4
Identifier Management
IA-5
Authenticator Management
IA-6
Authentication Feedback
IA-7
Cryptographic Module Authentication
IA-8
Identification and Authentication (Non-Organizational Users)
IA-9
Service Identification and Authentication
IA10
Adaptive Authentication
IA-11
Re-Authentication
PR.AC-4
Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties
AC-1
Policies and Procedures
AC-2
Account Management
AC-3
Access Enforcement
AC-5
Separation of Duties
AC-6
Least Privilege
AC-14
Permitted Actions without Identification or Authentication
AC-16
Security and Privacy Attributes
AC-24
Access Control Decisions
PR.DS-4
Adequate capacity to ensure availability is maintained
AU-4
Audit Log Storage Capacity
CP-2
Contingency Plan
SC-5
Denial-of-Service Protection
PR.DS-5
Protections against data leaks are implemented
AC-4
Information Flow Enforcement
AC-5
Separation of Duties
AC-6
Least Privilege
PE-19
Information Leakage
PS-3
Personnel Screening
PS-6
Access Agreements
SC-7
Boundary Protection
SC-8
Transmission Confidentiality and Integrity
SC-13
Cryptographic Protection
SC-31
Covert Channel Analysis
SI-4
System Monitoring
PR.IP-9
Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed
CP-2
Contingency Plan
CP-7
Alternate Processing Site
CP-12
Safe Mode
CP-13
Alternative Security Mechanisms
IR-7
Incident Response Assistance
IR-8
Incident Response Plan
IR-9
Information Spillage Response
PE-17
Alternate Work Site
PR.MA-2
Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access
MA-4
Nonlocal Maintenance
PR.PT-3
The principle of least functionality is incorporated by configuring systems to provide only essential capabilities
AC-3
Access Enforcement
CM-7
Least Functionality
DE.DP-1
Roles and responsibilities for detection are well-defined to ensure accountability
CA-2
Control Assessments
CA-7
Continuous Monitoring
PM-14
Testing, Training, and Monitoring
RS.RP-1
Response plan is executed during or after an incident
CP-2
Contingency Plan
CP-10
System Recovery and Reconstitution
IR-4
Incident Handling
IR-8
Incident Response Plan
RS.CO-1
Personnel know their roles and order of operations when a response is needed
CP-2
Contingency Plan
CP-3
Contingency Training
IR-3
Incident Response Testing
IR-8
Incident Response Plan
RS.CO-4
Coordination with stakeholders occurs consistent with response plans
CP-2
Contingency Plan
IR-4
Incident Handling
IR-8
Incident Response Plan
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt