| Identifier | Accountability | 
| Descriptive Name | Individual accountability | 
| Description | Individuals shall be held accountable for their actions. | 
| Selection Guidance | |
| Coverage Rationale | |
| Editorial | |
| Implementing Detailed Policy Statements | |
| Identifier | Authorities | 
| Descriptive Name | Notification of threats and vulnerabilities | 
| Description | Appropriate authorities shall be immediately notified of any threats or vulnerabilities impacting systems that process their data. | 
| Selection Guidance | |
| Coverage Rationale | |
| Editorial | |
| Implementing Detailed Policy Statements | |
| Identifier | Authorized_Use | 
| Descriptive Name | Authorized use of information | 
| Description | Information shall be used only for its authorized purpose(s). | 
| Selection Guidance | |
| Coverage Rationale | |
| Editorial | |
| Implementing Detailed Policy Statements | |
| Identifier | Availability | 
| Descriptive Name | Information availability | 
| Description | Information shall be available to satisfy mission requirements. | 
| Selection Guidance | |
| Coverage Rationale | |
| Editorial | |
| Implementing Detailed Policy Statements | |
| Identifier | Guidance | 
| Descriptive Name | Installation and usage guidance | 
| Description | Guidance shall be provided for the secure installation and use of the system. | 
| Selection Guidance | |
| Coverage Rationale | |
| Editorial | |
| Implementing Detailed Policy Statements | |
| Identifier | Information_AC | 
| Descriptive Name | Information access control | 
| Description | Information shall be accessed only by authorized individuals and processes. | 
| Selection Guidance | |
| Coverage Rationale | |
| Editorial | |
| Implementing Detailed Policy Statements | |
| Identifier | Integrity | 
| Descriptive Name | Information content integrity | 
| Description | Information shall retain its content integrity. | 
| Selection Guidance | |
| Coverage Rationale | |
| Editorial | |
| Implementing Detailed Policy Statements | |
| Identifier | Lifecycle | 
| Descriptive Name | System lifecycle phases integrate security | 
| Description | Information systems security shall be an integral part of all system lifecycle phases. | 
| Selection Guidance | |
| Coverage Rationale | |
| Editorial | |
| Implementing Detailed Policy Statements | |
| Identifier | Marking | 
| Descriptive Name | Information marking | 
| Description | Information shall be appropriately marked and labeled. | 
| Selection Guidance | |
| Coverage Rationale | |
| Editorial | |
| Implementing Detailed Policy Statements | |
| Identifier | Physical_Control | 
| Descriptive Name | Physical protection | 
| Description | Information shall be physically protected to prevent unauthorized disclosure, destruction, or modification. | 
| Selection Guidance | |
| Coverage Rationale | |
| Editorial | |
| Implementing Detailed Policy Statements | |