800-53 vs HIPAA

Side-by-side comparison of NIST SP 800-53 Rev 5 and HIPAA Security Rule across 49 cybersecurity controls.

46
Shared
3
800-53 Only
0
HIPAA Only
0
Neither

Covered by Both (46 controls)

Controls recognized by both 800-53 and HIPAA.

Gp Governance Policy
PL-1, PM-1 | §164.308(a)(1)(i), §164.316(a)
Aw Awareness & Training
AT-1, AT-2, AT-3 | §164.308(a)(5)(i), §164.308(a)(5)(ii)(A)
Rm Risk Management
RA-1, PM-9, PM-28 | §164.308(a)(1)(ii)(A), §164.308(a)(1)(ii)(B)
Sc Supply Chain Risk
SR-1, SR-2, SR-3 | §164.308(b)(1), §164.314(a)(1)
Rr Roles & Responsibilities
PM-2, PM-10, PS-7 | §164.308(a)(2), §164.308(a)(3)(i)
Cm Compliance
CA-2, CA-7, PM-4 | §164.308(a)(8), §164.316(b)(1)
Am Asset Management
CM-8, CM-9, PM-5 | §164.310(d)(1), §164.310(d)(2)(iii)
Ra Risk Assessment
RA-3, RA-5 | §164.308(a)(1)(ii)(A)
Be Business Environment
PM-7, PM-11 | §164.308(a)(1)(i)
Da Data Classification
RA-2, SC-16 | §164.312(a)(1)
Vn Vulnerability Mgmt
RA-5, SI-2, SI-5 | §164.308(a)(1)(ii)(A), §164.308(a)(8)
Ac Access Control
AC-1, AC-2, AC-3, AC-6 | §164.312(a)(1), §164.312(a)(2)(i)
Mf Multi-Factor Auth
IA-2 | §164.312(d)
En Encryption
SC-8, SC-12, SC-13, SC-28 | §164.312(a)(2)(iv), §164.312(e)(2)(ii)
Dp Data Protection
MP-2, MP-4, SC-8, SC-28 | §164.312(a)(2)(iv), §164.312(c)(1), §164.312(e)(1)
Bk Backup & Recovery
CP-9, CP-10 | §164.308(a)(7)(ii)(A), §164.310(d)(2)(iv)
Pa Privileged Access
AC-2, AC-6 | §164.312(a)(1), §164.308(a)(3)(ii)(B)
Fw Firewall / Net Seg
SC-7, AC-4 | §164.312(e)(1)
Ep Endpoint Protection
SI-3, SI-4 | §164.308(a)(5)(ii)(B), §164.310(d)(1)
Pm Patch Management
SI-2, CM-3 | §164.308(a)(1)(ii)(A), §164.308(a)(8)
Cf Secure Config
CM-2, CM-6, CM-7 | §164.310(d)(1), §164.312(a)(1)
Ml Email Security
SI-3, SI-8 | §164.308(a)(5)(ii)(A), §164.312(e)(1)
Ws Web Security
SC-7, SI-3 | §164.312(e)(1)
Zt Zero Trust
AC-4, SC-7 | §164.312(a)(1)
Mb Mobile Security
AC-19 | §164.310(d)(1), §164.312(a)(1)
Cl Cloud Security
AC-20, SA-9 | §164.308(b)(1), §164.314(a)(1)
Wf WAF
SC-7, SI-3 | §164.312(e)(1)
Dl DLP
AC-4, SC-7 | §164.312(a)(1), §164.312(e)(1)
Sm Cont. Monitoring
CA-7, SI-4 | §164.312(b)
Lg Logging & Audit
AU-2, AU-3, AU-6, AU-12 | §164.312(b), §164.308(a)(1)(ii)(D)
Id Intrusion Detection
SI-4 | §164.308(a)(1)(ii)(D), §164.312(b)
An Anomaly Detection
SI-4, AC-2 | §164.308(a)(1)(ii)(D)
Sg SIEM / SOC
AU-6, SI-4 | §164.308(a)(1)(ii)(D), §164.312(b)
Ir Incident Response
IR-1, IR-4, IR-5, IR-6 | §164.308(a)(6)(i), §164.308(a)(6)(ii)
Fn Forensics
IR-4, AU-7 | §164.308(a)(6)(ii)
Co Communication
IR-6, IR-7 | §164.308(a)(6)(ii), §164.404(a)(1)
Mt Mitigation
IR-4, IR-5 | §164.308(a)(6)(ii)
Rp Reporting
IR-6, IR-7, IR-8 | §164.308(a)(6)(ii), §164.404(a)(1), §164.408(a)
Rc Recovery Planning
CP-2, CP-10 | §164.308(a)(7)(i), §164.308(a)(7)(ii)(B)
Bc Business Continuity
CP-2, CP-6, CP-7 | §164.308(a)(7)(i), §164.308(a)(7)(ii)(C)
Ll Lessons Learned
IR-4, CP-4 | §164.308(a)(8)
Cr Comms & Restore
CP-2, IR-4 | §164.308(a)(7)(ii)(C)
Dr Disaster Recovery
CP-2, CP-10 | §164.308(a)(7)(ii)(A), §164.308(a)(7)(ii)(B)
Ap API Security
SC-7, SA-11 | §164.312(a)(1), §164.312(e)(1)
It Insider Threat
PM-12, AC-6, AU-12 | §164.308(a)(3)(ii)(A), §164.308(a)(4)
Vr Vendor Risk Mgmt
SA-9, SR-6, PM-30 | §164.308(b)(1), §164.314(a)(1), §164.314(a)(2)(i)

Only in 800-53 (3 controls)

Controls covered by 800-53 but not HIPAA. Organizations using HIPAA should consider supplementing with these.

Summary: 800-53 vs HIPAA

NIST SP 800-53 Rev 5 and HIPAA Security Rule share 46 controls in common out of 49 total. 800-53 uniquely covers 3 controls that HIPAA does not, including Threat Intelligence, Secure Development, DNS Security. HIPAA uniquely covers 0 controls that 800-53 does not. Together, these two frameworks cover all tracked controls. For comprehensive cybersecurity coverage, organizations often adopt both frameworks or supplement with other frameworks.

View Interactive Dashboard