ONLINE
THREATS: 4
1
1
1
0
0
1
0
1
1
1
1
1
1
1
1
0
0
0
1
1
1
1
1
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
0
1
1
0
0
1
1
0
1
1
0
1
FISMA

FISMA RMF Step 2: Select Security Controls

Loading advertisement...
56

I remember sitting across from a defense contractor's security team in 2017, watching their faces turn pale as they realized they'd selected the wrong baseline for their system. Six months of work. Hundreds of controls implemented. Thousands of dollars spent. And they'd have to start over.

"We thought Moderate impact meant we could use the Low baseline with a few additions," the lead engineer said, shuffling through printed NIST documents. "We were trying to save time."

They learned an expensive lesson that day: in the Risk Management Framework, Step 2—selecting security controls—is where you either build a foundation for success or create a compliance nightmare that haunts you for years.

After fifteen years of guiding federal agencies and contractors through FISMA compliance, I've seen this step trip up more organizations than any other. It's not because it's technically complex. It's because people underestimate its importance and rush through decisions that require careful analysis.

Let me show you how to get it right.

Understanding What You're Actually Selecting

Before we dive into the mechanics, let's clear up a fundamental misconception I encounter constantly.

You're not building a security program from scratch. You're not inventing controls. You're selecting from a catalog of proven, battle-tested security measures that have protected government systems for decades.

NIST Special Publication 800-53 is your shopping catalog. It contains over 1,000 security and privacy controls organized into 20 families. Think of it as the security equivalent of a building code—everything you need is documented, tested, and ready to implement.

"Selecting security controls isn't about creativity. It's about precision, judgment, and understanding the exact requirements your system must meet."

The key word here is select. You're making informed choices based on your Step 1 categorization, your organization's risk tolerance, and your system's specific characteristics.

The Three Baselines: Your Starting Point

Here's where most people start: the security control baselines. NIST provides three pre-configured sets of controls based on your system's impact level from Step 1.

Let me break this down with a table I reference constantly:

Impact Level

Baseline Controls

Typical Use Cases

Implementation Effort

Low

125+ controls

Public websites, general information systems, non-sensitive data

6-12 months for new systems

Moderate

325+ controls

Financial systems, personnel data, mission support systems

12-18 months for new systems

High

421+ controls

National security systems, critical infrastructure, classified data

18-36+ months for new systems

I worked with a Department of Energy lab in 2019 that categorized their research data management system as Low impact. "It's just research data," they argued. "Nothing classified."

During our review, we discovered the system contained:

  • Personally identifiable information (PII) of research participants

  • Proprietary corporate research data from private partners

  • Export-controlled technical specifications

That's a Moderate impact system all day long. We had to re-baseline with 200 additional controls. The delay cost them four months and nearly derailed a major research initiative.

The lesson? Your impact categorization from Step 1 directly determines your baseline. Get Step 1 wrong, and Step 2 becomes a disaster.

The Control Selection Process: How It Actually Works

Let me walk you through the process I use with every client. This is battle-tested across dozens of federal implementations.

Phase 1: Start with the Baseline

Your FIPS 199 categorization from Step 1 gives you your baseline. This is non-negotiable. If your system is Moderate, you start with the Moderate baseline. Period.

Here's a crucial truth I learned the hard way: you cannot negotiate down to a lower baseline. I've seen organizations try. I've watched them fail audits, lose certifications, and face consequences from authorizing officials.

A DOD contractor once asked me, "Can we use the Low baseline and just add the Moderate controls we think we need?"

My answer: "Only if you want to fail your assessment and lose your contract."

The baselines exist for a reason. They represent the minimum security posture for systems at each impact level, developed through decades of government security experience and lessons learned from actual breaches.

Phase 2: Tailor the Baseline

Now comes the interesting part. Tailoring lets you adjust the baseline to match your specific situation. But—and this is critical—tailoring doesn't mean weakening.

NIST 800-53B provides four tailoring criteria:

Tailoring Action

What It Means

When to Use

Approval Required

Assignment

Fill in organization-specific values

Customize control parameters

Internal review

Selection

Choose from multiple options

Pick appropriate implementation

Security team approval

Compensation

Use alternative controls

Technology limitations

Authorizing Official

Parameterization

Define specific values

Set thresholds, frequencies, etc.

Internal review

Let me give you a real example. Control AC-2(1) requires automated account management. The baseline says "automated mechanisms." During tailoring, you specify:

  • Assignment: "The organization employs automated mechanisms using [Active Directory, LDAP, or equivalent] to support account management."

  • Parameterization: "Accounts are reviewed every [30 days for privileged accounts, 90 days for standard users]."

I worked with a Veterans Affairs medical center in 2020 where we had to tailor extensively due to legacy medical equipment. Some devices were running Windows XP (yes, really) because the medical device manufacturers hadn't certified newer systems.

We couldn't simply exempt these systems. Instead, we:

  • Implemented network segmentation (compensating control)

  • Added enhanced monitoring (additional control)

  • Created restricted maintenance procedures (supplemental guidance)

  • Documented the risk and got explicit AO acceptance

That's proper tailoring—not eliminating requirements, but adapting implementation while maintaining security posture.

Phase 3: Apply Overlays

Overlays are pre-configured sets of tailored controls for specific environments or technologies. Think of them as specialized filters you apply on top of your baseline.

Common overlays include:

Overlay Type

Purpose

When to Apply

Cloud Computing

Controls for cloud environments

AWS, Azure, Google Cloud deployments

Industrial Control Systems

SCADA and ICS-specific controls

Manufacturing, utilities, infrastructure

Privacy

Enhanced privacy controls

Systems with PII, PHI, or sensitive personal data

Classified National Security

Enhanced controls for classified systems

Secret, Top Secret systems

Low Impact

Simplified controls for low-impact systems

Low-impact SAAS applications

I remember implementing the ICS overlay for a power generation facility in 2018. The baseline Moderate controls included requirements that simply didn't make sense for programmable logic controllers (PLCs) and SCADA systems.

The ICS overlay provided:

  • Adapted access controls for industrial protocols

  • Modified patch management for change-sensitive systems

  • Enhanced physical security for control rooms

  • Specialized incident response for operational technology

Without the overlay, we would have spent months trying to force IT security controls onto OT systems. With it, we had a clear roadmap that recognized the unique security requirements of industrial environments.

Phase 4: Supplement as Needed

Here's where your organization's specific risk tolerance comes into play. You can add controls beyond the baseline if your risk assessment indicates additional protection is needed.

I worked with a federal financial agency that added 47 controls on top of the Moderate baseline because:

  • They handled financial transactions worth billions daily

  • They were a known target for nation-state actors

  • Their authorizing official demanded enhanced protection

The supplemental controls focused on:

  • Advanced threat detection

  • Enhanced encryption

  • Additional access restrictions

  • Increased monitoring and logging

But here's the critical point: adding controls increases your implementation and maintenance burden. Every control you add is a control you must implement, test, and maintain forever.

"Add controls judiciously. Each one is a commitment you'll live with for years. Make sure the security benefit justifies the operational cost."

The Control Families: What You Need to Know

NIST 800-53 organizes controls into 20 families. Understanding these families helps you see how controls work together as a comprehensive security program.

Here's my quick reference guide:

Family

ID

Key Focus

Baseline Controls (Moderate)

Common Challenges

Access Control

AC

Who can access what

25 controls

Complex role definitions

Awareness and Training

AT

Security education

6 controls

Ongoing effort required

Audit and Accountability

AU

Logging and monitoring

14 controls

Log storage and analysis

Assessment, Authorization

CA

Testing and certification

9 controls

Resource intensive

Configuration Management

CM

System baseline control

14 controls

Change management overhead

Contingency Planning

CP

Business continuity

13 controls

Testing requirements

Identification and Authentication

IA

User verification

11 controls

Multi-factor implementation

Incident Response

IR

Security event handling

10 controls

Procedure development

Maintenance

MA

System upkeep

6 controls

Documentation burden

Media Protection

MP

Data on media

8 controls

Disposal procedures

Physical and Environmental

PE

Facility security

20 controls

Facility modifications

Planning

PL

Security planning

11 controls

Document maintenance

Program Management

PM

Overall program management

16 controls

Organizational coordination

Personnel Security

PS

Workforce security

9 controls

Background investigations

Risk Assessment

RA

Risk identification

10 controls

Ongoing assessment

System and Services Acquisition

SA

Secure procurement

22 controls

Vendor coordination

System and Communications Protection

SC

Technical protection

44 controls

Architecture complexity

System and Information Integrity

SI

Malware, flaws, monitoring

23 controls

Tool integration

Supply Chain Risk Management

SR

Supply chain security

12 controls

Third-party visibility

PII Processing and Transparency

PT

Privacy protection

8 controls

Privacy program coordination

Let me share a story about why understanding these families matters.

In 2021, I was reviewing a contractor's System Security Plan. They'd meticulously implemented all the technical controls—AC, IA, SC, SI—beautiful work. Their systems were locked down tight.

But they'd completely neglected the program management controls—AT, PL, PM, PS. No security awareness training. No documented security plans. No personnel screening. No program oversight.

During their assessment, the auditor failed them immediately. "You've built a technically secure system," he said, "but you haven't built a security program. Without the management controls, everything else is just theater."

They spent another six months implementing the controls they'd initially skipped, delaying their authorization by half a year.

The lesson: All 20 families matter. You can't cherry-pick the ones that seem technical or important and ignore the rest.

Common Selection Mistakes (And How to Avoid Them)

After guiding dozens of organizations through control selection, I've seen the same mistakes repeatedly. Let me save you from making them.

Mistake 1: Selecting Based on What You Already Have

I can't count how many times I've heard: "We already have a firewall, so we're good for SC-7 (Boundary Protection), right?"

Wrong. Dead wrong.

Control selection is based on requirements, not current capabilities. You select what the system needs, then implement it. If you select controls based only on what you have, you're designing security to fit your tools instead of selecting tools to meet your security requirements.

A Department of Commerce bureau made this mistake in 2019. They selected controls that matched their existing tools, then acted surprised when the assessment revealed gaps. "But we have everything implemented!" they protested.

"Yes," the assessor replied, "you implemented the wrong things."

Mistake 2: Over-Relying on Compensating Controls

Compensating controls are legitimate when technology or operational constraints make standard implementation impossible. But I've seen organizations try to compensate their way out of controls they just didn't want to implement.

Here's the truth: Authorizing Officials are getting wise to this game. They're pushing back on compensating controls that look like workarounds rather than genuine technical limitations.

A defense contractor tried to use network segmentation as a compensating control for missing encryption. Their logic: "If attackers can't reach the data, encryption doesn't matter."

The AO rejected it. "Encryption protects against insider threats, physical theft, and backup media exposure. Segmentation addresses none of those risks. Implement the control properly or accept the risk formally."

Mistake 3: Ignoring Control Dependencies

Controls don't exist in isolation. Many controls depend on others being in place first.

For example, you can't effectively implement:

  • AU-6 (Audit Review) without AU-2 (Audit Events) and AU-12 (Audit Generation)

  • CM-3 (Change Control) without CM-2 (Baseline Configuration)

  • IR-4 (Incident Handling) without IR-8 (Incident Response Plan)

I watched a team spend three months trying to implement IR-4 without first creating the IR-8 plan. They built procedures, trained staff, and conducted exercises—all without a documented framework to guide them.

When the assessment came, everything fell apart. "You have activities," the assessor noted, "but no coherent incident response capability. Start with the plan, then build the procedures around it."

Control Selection for Different System Types

Not all systems are created equal. Let me share some hard-won wisdom about selecting controls for specific system types.

Cloud-Hosted Systems

Cloud changes everything about control implementation—but it doesn't change control selection.

A common misconception: "We're in AWS, so AWS handles security controls."

Partially true, but dangerously incomplete.

Here's how shared responsibility affects control selection:

Control Type

Your Responsibility

Cloud Provider Responsibility

Selection Impact

Physical Security (PE)

Minimal

Data center security

Still select, document inheritance

Infrastructure (SC)

Shared

Network, hardware

Select all, implement where responsible

Platform (CM, SI)

Primary

Patch management support

Select all, leverage provider capabilities

Application (AC, IA)

Complete

None

Select and implement fully

Data (SC, MP)

Complete

None

Select and implement fully

I worked with a SaaS provider in 2020 deploying on Azure Government Cloud. They initially thought they could skip PE controls entirely because Azure handled physical security.

Wrong. They still had to:

  • Select the PE controls

  • Document Azure's implementation

  • Verify Azure's compliance through FedRAMP authorization

  • Identify any residual responsibilities

  • Test their access to Azure facilities (tours, documentation review)

Your control selection is independent of your hosting model. Your implementation leverages the provider's capabilities, but you can't skip selection.

Legacy Systems

Legacy systems present unique challenges. You can't always implement modern controls on 20-year-old technology.

But here's what you can't do: simply exclude controls because they're hard to implement.

A NASA facility I worked with had a satellite tracking system running on hardware from 2002. Modern authentication controls? Not happening. Automated patching? Impossible. Network segmentation? The system predated VLANs.

We still had to select all required controls. Then we:

  • Implemented compensating controls (enhanced monitoring, physical isolation)

  • Documented technical limitations

  • Conducted enhanced risk assessment

  • Got explicit AO acceptance of residual risk

  • Created sunset plan for system replacement

The authorizing official accepted the approach because we were transparent about limitations and demonstrated defense-in-depth through compensating measures.

Legacy systems don't get a free pass. They get creative implementation and honest risk acceptance.

Multi-System Platforms

When you have multiple systems sharing infrastructure, control selection gets complicated.

Do you select controls for each system independently? Do you create one super-set of controls? How do you handle systems with different impact levels on the same platform?

Here's my approach:

Scenario

Selection Strategy

Example

Multiple low-impact systems

Single baseline, common controls

Public information websites

Mixed impact levels

Highest baseline applies to platform

Low and Moderate systems co-hosted

Isolated systems on shared hardware

Individual baselines with inherited common controls

Virtualized environments

System of systems

System-specific + platform-wide controls

Integrated applications sharing data

I guided a DOD agency through this in 2021. They had 15 applications—5 Low, 8 Moderate, 2 High—all running on the same virtualized infrastructure.

We created:

  • Platform baseline: High impact (protecting the highest-impact systems)

  • Common controls: Implemented once at the platform level

  • System-specific controls: Tailored to each application's needs

  • Inherited controls: Documented how systems leveraged platform controls

This approach saved them from implementing the High baseline 15 times while ensuring adequate protection for all systems.

Documentation: The Unsung Hero of Control Selection

Here's something nobody tells you: the quality of your control selection documentation determines your assessment success as much as your actual implementation.

I've seen organizations with excellent security implementations fail assessments because they couldn't document their selection rationale. I've seen organizations with mediocre security pass because their documentation was pristine.

Your control selection documentation should include:

The Security Control Baseline

A clear statement of your starting point:

System: Financial Management System
Impact Level: Moderate (FIPS 199)
Control Baseline: NIST 800-53 Rev 5 Moderate Baseline
Total Baseline Controls: 325

Tailoring Decisions

Every deviation from the baseline must be documented:

Control

Tailoring Action

Rationale

Approver

Date

AC-2(1)

Assignment

Specified Active Directory as automation mechanism

ISSO

2024-01-15

CP-2

Parameterization

Set RTO to 4 hours based on mission criticality

System Owner

2024-01-20

SC-13

Compensation

Legacy device limitation; added network isolation

AO

2024-02-01

Supplemental Controls

If you're adding controls beyond the baseline:

Control

Reason Added

Risk Addressed

Implementation Lead

AC-2(12)

AO requirement

Privileged account monitoring

Security team

AU-6(3)

High-value target

Advanced threat detection

SOC

SC-7(20)

Regulatory requirement

Dynamic threat protection

Network team

Overlay Applications

Which overlays you applied and why:

Applied Overlays:
1. Privacy Overlay (NIST 800-53B Appendix C)
   - Reason: System processes PII for 100,000+ individuals
   - Additional controls: 12
   - Key additions: PT-1, PT-2, PT-3, PT-6, PT-7
2. Cloud Computing Overlay (NIST 800-53B Appendix D) - Reason: System hosted on AWS GovCloud - Modified controls: 18 - Key modifications: CP-10, SC-7, SC-12, SC-13

I once reviewed a System Security Plan where control selection filled exactly one paragraph: "Selected Moderate baseline controls per NIST 800-53."

That's it. No tailoring documentation. No overlay justification. No supplemental control rationale.

The assessment took twice as long because the assessor had to reverse-engineer every decision. Questions that could have been answered by documentation required interviews, evidence gathering, and clarification meetings.

Good documentation transforms assessments from interrogations into verifications.

The Authorizing Official's Perspective

Let me share something crucial: the Authorizing Official's risk acceptance ultimately determines control selection success.

I've sat in hundreds of meetings with AOs. I've watched them approve creative solutions and reject textbook implementations. I've seen patterns in what they accept and what they push back on.

Here's what AOs actually care about:

1. Risk Transparency

AOs hate surprises. They love honesty.

If you've tailored controls, tell them why. If you've accepted risk, quantify it. If you've implemented compensating controls, demonstrate equivalence.

An AO told me once: "I can accept almost any risk if I understand it. What I can't accept is discovering risks I didn't know existed."

2. Mission Alignment

Control selection must support the mission, not obstruct it.

I worked with a diplomatic communications system where standard authentication controls would have prevented emergency communications during crises. We selected an alternative approach that balanced security with operational necessity.

The AO approved it because we demonstrated:

  • Understanding of mission requirements

  • Analysis of security vs. operational risk

  • Compensating controls for reduced authentication

  • Monitoring to detect potential abuse

3. Evidence of Thoughtfulness

AOs can tell the difference between "we selected what was easy" and "we selected what was appropriate."

Show them you've:

  • Analyzed your specific risk environment

  • Considered alternatives

  • Consulted relevant stakeholders

  • Made informed trade-offs

"Authorizing Officials don't expect perfection. They expect informed decision-making, clear communication, and honest risk assessment."

Common Questions I Get Asked

Let me address the questions that come up in every implementation:

Q: Can we use controls from different revisions of NIST 800-53?

No. Pick a revision and stick with it. Mixing Rev 4 and Rev 5 controls creates confusion, complicates assessments, and frustrates auditors.

Q: What if a control doesn't apply to our system?

Document it as "Not Applicable" with clear justification. But be prepared to defend that assertion. Assessors scrutinize NA designations carefully.

Q: Can we implement controls differently than described in NIST 800-53?

Yes, but you need to demonstrate equivalent protection. Alternative implementations require clear documentation and AO approval.

Q: How often do we need to review our control selection?

Formally: at least every three years during re-authorization. Practically: whenever the system changes significantly.

Q: What if we discover we selected the wrong controls after implementation?

It happens. Document the gap, assess the risk, implement the correct controls, and update your documentation. Better to find it yourself than during assessment.

Tools and Resources That Actually Help

After years of doing this manually, I've found a few tools that genuinely make control selection easier:

NIST Resources

  • NIST 800-53 Rev 5: The control catalog (obviously)

  • NIST 800-53B: Control baselines and tailoring guidance

  • NIST 800-37 Rev 2: RMF methodology

  • NIST Cybersecurity Framework: Mapping to 800-53 controls

Automated Tools

I've used most of the GRC platforms on the market. Here's my honest assessment:

Tool Type

Pros

Cons

Best For

Enterprise GRC Platforms

Comprehensive, integrated

Expensive, complex

Large agencies, complex environments

Specialized RMF Tools

Purpose-built, efficient

Limited scope

Federal-focused organizations

Spreadsheet Templates

Free, flexible

Manual, error-prone

Small systems, tight budgets

Custom Databases

Tailored to needs

Development effort

Organizations with unique requirements

Honestly? For most organizations starting out, a well-designed spreadsheet works fine. As you grow and add systems, investing in a proper GRC platform pays dividends.

Real-World Selection: A Case Study

Let me walk you through an actual control selection I guided in 2022 for a Department of Education student loan management system.

System Profile:

  • Cloud-hosted (AWS GovCloud)

  • 5 million user accounts

  • Financial and PII data

  • Mission-critical availability requirements

Step 1: Determine Baseline

Impact categorization:

  • Confidentiality: Moderate (PII and financial data)

  • Integrity: High (loan amount modifications would be catastrophic)

  • Availability: Moderate (downtime impacts operations but isn't life-threatening)

Overall Impact: High (highest category determines overall)

Starting point: 421 controls from High baseline

Step 2: Apply Overlays

We applied two overlays:

Cloud Computing Overlay:

  • Modified 23 controls for cloud context

  • Added cloud-specific implementation guidance

  • Documented AWS GovCloud's inherited controls

Privacy Overlay:

  • Added 8 privacy-focused controls

  • Enhanced PII protection requirements

  • Implemented privacy impact assessment

Step 3: Tailor the Baseline

We documented 47 tailoring decisions:

Assignments (18): Specified organizational values

  • Password complexity requirements

  • Audit log retention periods

  • Encryption algorithms

Selections (12): Chose from multiple options

  • Backup frequencies

  • Monitoring tools

  • Notification procedures

Compensations (7): Alternative implementations

  • Legacy interface couldn't support MFA; added enhanced logging + IP restrictions

  • Third-party payment processor; contractual requirements + monitoring

Parameterizations (10): Set specific values

  • Access review frequency

  • Incident response timeframes

  • Change approval thresholds

Step 4: Supplement as Needed

Based on threat intelligence and risk assessment, we added 12 controls:

  • Enhanced monitoring for student loan fraud patterns

  • Additional encryption for specific data elements

  • Advanced authentication for high-risk transactions

  • Increased logging for financial operations

Final Count: 433 controls (421 baseline + 12 supplemental)

The Outcome:

  • Implementation: 14 months

  • Cost: $2.8 million (including existing tools)

  • Assessment: Passed with 3 findings (all quickly remediated)

  • Time to ATO: 16 months from selection to authorization

The key to success? We didn't rush the selection phase. We spent 6 weeks analyzing requirements, consulting stakeholders, documenting decisions, and getting preliminary AO feedback before starting implementation.

That upfront investment prevented months of rework later.

Your Selection Checklist

Before you finalize your control selection, run through this checklist I use with every client:

Foundation:

  • [ ] Impact categorization from Step 1 is documented and approved

  • [ ] Baseline (Low/Moderate/High) correctly matches impact level

  • [ ] All baseline controls are included in selection

Tailoring:

  • [ ] Every tailoring decision is documented with rationale

  • [ ] Assignments specify organizational values

  • [ ] Selections choose appropriate options

  • [ ] Compensating controls demonstrate equivalent protection

  • [ ] Parameterizations include specific, measurable values

Overlays:

  • [ ] Applicable overlays identified (cloud, ICS, privacy, etc.)

  • [ ] Overlay modifications documented

  • [ ] Additional controls from overlays included

Supplements:

  • [ ] Risk-based justification for additional controls

  • [ ] Operational feasibility of supplemental controls verified

  • [ ] Budget impact of additions assessed

Dependencies:

  • [ ] Control dependencies mapped

  • [ ] Implementation sequence planned

  • [ ] Common controls identified and documented

Documentation:

  • [ ] Complete control list with identifiers

  • [ ] Tailoring decisions recorded

  • [ ] Responsibility assignments made

  • [ ] Review and approval obtained

Stakeholder Alignment:

  • [ ] System owner consulted

  • [ ] Security team reviewed selection

  • [ ] AO provided preliminary feedback

  • [ ] Budget authority confirmed resources

The Hard Truth About Control Selection

Let me close with something I wish someone had told me fifteen years ago:

Perfect control selection doesn't exist.

You will make decisions you later question. You will discover controls you wish you'd included. You will implement controls that turn out to be less useful than expected.

That's okay. That's normal. That's why the RMF is a continuous process, not a one-time event.

What matters is:

  • You selected controls thoughtfully

  • You documented your decisions clearly

  • You implemented controls effectively

  • You monitor and adjust continuously

I've guided organizations through dozens of RMF implementations. The ones that succeed aren't the ones with perfect initial selections. They're the ones that treat selection as the foundation of an evolving security program.

They select carefully. They implement thoroughly. They assess honestly. They improve continuously.

"Control selection is where your compliance journey becomes real. Choose wisely, document completely, and remember: you're building security that must protect real systems, real data, and real missions."

The systems you protect matter. The data you safeguard is important. The missions you enable are critical.

Select your controls accordingly.

56

RELATED ARTICLES

COMMENTS (0)

No comments yet. Be the first to share your thoughts!

SYSTEM/FOOTER
OKSEC100%

TOP HACKER

1,247

CERTIFICATIONS

2,156

ACTIVE LABS

8,392

SUCCESS RATE

96.8%

PENTESTERWORLD

ELITE HACKER PLAYGROUND

Your ultimate destination for mastering the art of ethical hacking. Join the elite community of penetration testers and security researchers.

SYSTEM STATUS

CPU:42%
MEMORY:67%
USERS:2,156
THREATS:3
UPTIME:99.97%

CONTACT

EMAIL: [email protected]

SUPPORT: [email protected]

RESPONSE: < 24 HOURS

GLOBAL STATISTICS

127

COUNTRIES

15

LANGUAGES

12,392

LABS COMPLETED

15,847

TOTAL USERS

3,156

CERTIFICATIONS

96.8%

SUCCESS RATE

SECURITY FEATURES

SSL/TLS ENCRYPTION (256-BIT)
TWO-FACTOR AUTHENTICATION
DDoS PROTECTION & MITIGATION
SOC 2 TYPE II CERTIFIED

LEARNING PATHS

WEB APPLICATION SECURITYINTERMEDIATE
NETWORK PENETRATION TESTINGADVANCED
MOBILE SECURITY TESTINGINTERMEDIATE
CLOUD SECURITY ASSESSMENTADVANCED

CERTIFICATIONS

COMPTIA SECURITY+
CEH (CERTIFIED ETHICAL HACKER)
OSCP (OFFENSIVE SECURITY)
CISSP (ISC²)
SSL SECUREDPRIVACY PROTECTED24/7 MONITORING

© 2026 PENTESTERWORLD. ALL RIGHTS RESERVED.