Research Article
Security Evaluation Framework for Military IoT Devices
Table 2
Number of security controls that do not provide mapping table in NIST 800-53.
| | Security Controls | Total | Not Provides |
| | AC | Access Control | 25 | 8 |
| | AT | Awareness and Training | 5 | 1 |
| | AU | Audit and Accountability | 12 | 4 |
| | CA | Security Assessment and Authorization | 9 | 5 |
| | CM | Configuration Management | 11 | 2 |
| | CP | Contingency Planning | 13 | 1 |
| | IA | Identification and Authentication | 11 | 4 |
| | IR | Incident Response | 10 | 5 |
| | MA | Maintenance | 6 | 3 |
| | MP | Media Protection | 8 | 1 |
| | PE | Physical and Environmental Protection | 20 | 2 |
| | PL | Planning | 9 | 1 |
| | PS | Personnel Security | 8 | 1 |
| | RA | Risk Assessment | 6 | 1 |
| | SA | System and services Acquisition | 22 | 8 |
| | SC | System and Communications Protection | 44 | 31 |
| | SI | System and Information Integrity | 16 | 11 |
| | PM | Program Management | 9 | 5 |
|
|