Research Article
Security Evaluation Framework for Military IoT Devices
Table 2
Number of security controls that do not provide mapping table in NIST 800-53.
| Security Controls | Total | Not Provides |
| AC | Access Control | 25 | 8 |
| AT | Awareness and Training | 5 | 1 |
| AU | Audit and Accountability | 12 | 4 |
| CA | Security Assessment and Authorization | 9 | 5 |
| CM | Configuration Management | 11 | 2 |
| CP | Contingency Planning | 13 | 1 |
| IA | Identification and Authentication | 11 | 4 |
| IR | Incident Response | 10 | 5 |
| MA | Maintenance | 6 | 3 |
| MP | Media Protection | 8 | 1 |
| PE | Physical and Environmental Protection | 20 | 2 |
| PL | Planning | 9 | 1 |
| PS | Personnel Security | 8 | 1 |
| RA | Risk Assessment | 6 | 1 |
| SA | System and services Acquisition | 22 | 8 |
| SC | System and Communications Protection | 44 | 31 |
| SI | System and Information Integrity | 16 | 11 |
| PM | Program Management | 9 | 5 |
|
|