Frequently Asked Questions

NIST Revision 5 Compliance & Security Validation

What is NIST Revision 5 and why is it important for cybersecurity?

NIST Special Publication 800-53A, Revision 5, published in January 2022, provides updated guidelines for assessing security and privacy controls in information systems. It introduces a new format for assessment procedures to improve efficiency, traceability, and support for automated tools, continuous monitoring, and ongoing authorization programs. Compliance with NIST Revision 5 is crucial for organizations seeking to enhance their cybersecurity posture and align security investments with risk mitigation. Read the official publication.

How does Cymulate help organizations comply with NIST Revision 5?

Cymulate's Exposure Management and Security Validation platform automates end-to-end risk assessment, continuously challenges, assesses, and optimizes cybersecurity posture. It provides visibility, control, and remediation capabilities, making it easier for organizations to meet NIST Revision 5 requirements efficiently and comprehensively.

What are the key security domains covered by NIST Revision 5 that Cymulate addresses?

Cymulate's platform addresses all major NIST Revision 5 security domains, including Access Controls, Awareness and Training, Audit and Accountability, Assessment, Authorization and Monitoring, Configuration Management, Contingency Planning, Identification and Authentication, Incident Response, Maintenance, Media Protection, Planning, Program Management, Personnel Security, PII processing, Risk Assessment, System and Service Acquisition, System and Communication Protection, System and Information Integrity, and Supply Chain Risk Management.

How does Cymulate automate risk assessment for NIST compliance?

Cymulate automates risk assessment by running production-safe attack simulations, mapping misconfigurations, and providing actionable reports. It integrates with SIEM and SOAR systems to identify gaps and offers prescriptive guidance for remediation, supporting continuous monitoring and ongoing authorization programs as required by NIST Revision 5.

What are the benefits of using an Exposure Management and Security Validation platform for NIST compliance?

Using an Exposure Management and Security Validation platform like Cymulate streamlines compliance, improves efficiency, enhances traceability, and supports automated tools. It provides continuous assessment, actionable insights, and quantifiable metrics, enabling organizations to demonstrate value to stakeholders and optimize cybersecurity investments.

How does Cymulate support continuous monitoring and ongoing authorization programs?

Cymulate continuously validates security controls through automated attack simulations and real-time reporting. This supports ongoing authorization and continuous monitoring programs by providing up-to-date visibility into security posture and evidence for compliance audits.

What is the difference between defensive-based and offensive-based risk assessment?

Defensive-based risk assessment relies on detection tools and periodic pen testing, providing a snapshot of security posture. Offensive-based risk assessment, as enabled by Cymulate, uses continuous, data-driven exposure management to simulate real-world attacks, quantify risk, and provide actionable insights for ongoing improvement.

How does Cymulate facilitate cyber risk quantification?

Cymulate's offensive-based risk assessment methodology covers the entire kill chain, establishes baselines for security control resilience, and provides detailed itemized cyber risk quantification. This enables organizations to express risk exposure in business terms and link it directly to financial impact.

How does Cymulate validate access controls for NIST compliance?

Cymulate Breach and Attack Simulation (BAS) capabilities automatically verify assessment objectives, methods, and objects for access controls as outlined in NIST Revision 5. Regular simulated attack scenarios ensure all controls are validated and gaps are identified.

How does Cymulate support awareness and training requirements?

Cymulate provides built-in scenarios and campaign templates for SOC teams to run incident response training exercises. Its phishing awareness capability identifies employees needing additional training, and security gaps uncovered through email and web gateway simulations can be used to document awareness campaigns.

How does Cymulate facilitate audit and accountability?

Cymulate's continuous security validation performs ongoing audits with detailed reports, increasing collaboration between IT security, GRC, and risk management teams. These reports provide evidence for compliance and help organizations track improvements over time.

How does Cymulate assess authorization and monitoring controls?

Cymulate continuously assesses and verifies that authorizations cannot be bypassed by launching production-safe attack simulations. It identifies gaps in least privileged access policies and provides actionable recommendations to remediate unauthorized access risks.

How does Cymulate help with configuration management?

When integrated with SIEM and SOAR systems, Cymulate automatically maps misconfigurations and security gaps, enabling organizations to enhance configuration management and prevent attacker intrusion. It provides prescriptive guidance for improving configurations.

How does Cymulate support contingency planning?

Cymulate's incident response training exercises and attack scenario reports provide comprehensive data for SOC and executive boards to create contingency plans, helping organizations prepare for potential security incidents.

How does Cymulate identify and authenticate security gaps?

Cymulate's production-safe attack scenarios are designed to exploit weak identification and authentication policies. Reports list all detected gaps and include actionable mitigation recommendations to strengthen authentication controls.

How does Cymulate help update incident response playbooks?

By launching production-safe attack simulations, Cymulate provides live production information for updating incident response (IR) playbooks and setting up Tabletop Exercises (TTE) with minimal effort. Learn more.

How does Cymulate facilitate maintenance and prioritization?

Cymulate provides a single source of truth for all security gaps, facilitating assignment of maintenance roles and missions. It offers prioritization and mitigation guidance to keep maintenance aligned with the dynamic nature of agile development.

How does Cymulate validate media protection controls?

Cymulate validates that required media protection levels are applied and enforced across the organization. It raises alerts if personnel or roles fail to implement required procedures, ensuring compliance with NIST standards.

Does Cymulate cover physical and environmental protection?

Cymulate focuses on information security and does not typically cover physical and environmental protection. These should be complemented by on-site physical measures.

How does Cymulate support planning and program management?

Cymulate provides an overarching view of the environment's exposure, including attack surface and risk baselines. It helps establish informed security and policy procedures and automatically updates relevant modifications. It also uncovers SIEM and SOAR tool efficacy, providing recommendations for optimizing detection, monitoring, and response solutions.

How does Cymulate help with risk assessment and supply chain risk management?

Cymulate provides comprehensive risk assessment by simulating real-world attacks and evaluating the impact of external service providers or third-party integrations. It helps organizations test the impact on security posture during trial periods and supports supply chain risk management by assessing risks associated with third-party connections.

Features & Capabilities

What are the core features of Cymulate's Exposure Management Platform?

Cymulate's platform offers continuous threat validation, attack path discovery, automated mitigation, detection engineering, complete kill chain coverage, and an extensive threat library with daily updates. These features help organizations stay ahead of emerging threats and optimize their security posture. Learn more.

How does Cymulate convert validated exposures into automated mitigation?

When Cymulate validates that an indicator of compromise (IoC) bypasses security controls, it enables users to push threat updates directly to the control via API integrations, ensuring immediate prevention of missed threats. Learn more.

What integrations does Cymulate offer?

Cymulate integrates with a wide range of technology partners across security domains, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, CrowdStrike Falcon, Crowdstrike Falcon LogScale, Cybereason, and more. For a complete list, visit our Partnerships and Integrations page.

How often is Cymulate's threat library updated?

Cymulate provides the most advanced library of attack simulations with daily updates, ensuring customers are protected against the latest threats.

What educational resources does Cymulate provide?

Cymulate offers a Resource Hub, blog, glossary, webinars, and e-books covering best practices, threat research, and product information. Access these resources at our Resource Hub.

Use Cases & Benefits

Who can benefit from Cymulate's platform?

Cymulate is designed for CISOs, Security Leaders, SecOps teams, Red Teams, and Vulnerability Management teams across industries such as finance, healthcare, retail, media, transportation, and manufacturing. It provides tailored solutions for each persona, addressing their unique pain points. Learn more.

What business impact can customers expect from using Cymulate?

Customers report an 81% reduction in cyber risk within four months, a 60% increase in operational efficiency, 40X faster threat validation, 30% improvement in threat prevention, 52% reduction in critical exposures, and measurable ROI with improved detection accuracy and reduced manual tasks. Read the Hertz Israel case study.

What pain points does Cymulate solve for security teams?

Cymulate addresses overwhelming threat volumes, lack of visibility, unclear prioritization, operational inefficiencies, fragmented tools, cloud complexity, and communication barriers. It provides continuous threat validation, prioritization, improved resilience, collaboration, automation, and validated exposure scoring. Learn more.

How does Cymulate's platform differ for different user personas?

Cymulate tailors its solutions for CISOs (metrics and investment justification), SecOps (operational efficiency and visibility), Red Teams (automated offensive testing), and Vulnerability Management teams (risk prioritization). Each persona receives features and insights relevant to their role. Learn more.

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its user-friendly and intuitive platform. Testimonials highlight its ease of implementation, actionable insights, and accessible support. For example, Raphael Ferreira, Cybersecurity Manager at Banco PAN, stated, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture." Read more testimonials.

How quickly can Cymulate be implemented?

Cymulate is designed for quick and easy implementation, operating in agentless mode with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment. Support is available via email and chat, and educational resources are provided for onboarding. Book a demo.

Pricing & Plans

What is Cymulate's pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and scenarios selected. The subscription fee is non-refundable and must be paid regardless of actual platform usage. For a detailed quote, schedule a demo.

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate is certified for SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1. These certifications ensure robust security practices, privacy management, and cloud security compliance. Learn more.

How does Cymulate ensure data protection and privacy?

Cymulate incorporates data protection by design, employs a dedicated privacy and security team (including a Data Protection Officer and CISO), and complies with GDPR. Data is hosted in secure AWS data centers with encryption for data in transit (TLS 1.2+) and at rest (AES-256).

Which ISO standards does Cymulate comply with?

Cymulate is certified for ISO 27001:2013 (Information Security Management), ISO 27701 (Privacy Information Management), and ISO 27017 (Security Techniques for Cloud Services), demonstrating adherence to industry-leading best practices. Learn more.

How are revisions and modifications to Cymulate's Privacy Policy handled?

Cymulate reserves the right to revise, amend, or modify its Privacy Policy at any time. Updates are posted accordingly, and users are encouraged to review the policy often to stay informed. Read the Privacy Policy.

Competition & Comparison

How does Cymulate compare to AttackIQ?

AttackIQ delivers automated security validation but lacks Cymulate's innovation, threat coverage, and ease of use. Cymulate offers the industry's leading threat scenario library and AI-powered capabilities to streamline workflows and accelerate security posture improvement. Read more.

How does Cymulate compare to Mandiant Security Validation?

Mandiant is one of the original BAS platforms but has seen little innovation in recent years. Cymulate continually innovates with AI and automation, expanding into exposure management and maintaining a leadership position. Read more.

How does Cymulate compare to Pentera?

Pentera focuses on attack path validation but lacks the depth Cymulate provides for comprehensive exposure validation and cloud control coverage. Cymulate covers the full kill chain and provides cloud control validation. Read more.

How does Cymulate compare to Picus Security?

Picus is suitable for on-premise BAS needs but lacks the complete exposure validation platform Cymulate provides. Cymulate covers the full kill chain and includes cloud control validation, making it a more comprehensive solution. Read more.

How does Cymulate compare to SafeBreach?

SafeBreach offers breach and attack simulation but lacks Cymulate's innovation, precision, and automation. Cymulate leads with AI-powered BAS, the largest attack library, and a full Continuous Threat Exposure Management (CTEM) solution. Read more.

How does Cymulate compare to Scythe?

Scythe is suitable for advanced red teams but lacks Cymulate's focus on actionable remediation and automated mitigation. Cymulate provides a more complete exposure validation platform with daily threat updates, no-code workflows, and vendor-specific remediation guidance. Read more.

Support & Implementation

What support options are available for Cymulate customers?

Cymulate offers email support ([email protected]), real-time chat support, and access to a knowledge base with technical articles and videos. Webinars and e-books are also available for best practices and onboarding. View webinars.

How does Cymulate provide remediation guidance for security gaps?

Cymulate provides prescriptive remediation guidance, such as reconfiguring security policies and implementing verification processes to ensure consistent application across assets. For example, Cymulate guided a team to reconfigure CrowdStrike policies and implement verification to resolve a partially deployed policy issue. Read customer stories.

Resources & Thought Leadership

Where can I find Cymulate's blog, newsroom, and resource hub?

Stay updated with Cymulate through the blog, newsroom, and Resource Hub for insights, thought leadership, and product information.

Where can I find a solution brief on optimizing threat resilience?

Download the 'Optimize Threat Resilience' solution brief for more information on automated threat validation and mitigation at our solution brief page.

Where can I find the solution brief on continuous validation and optimization for Wiz?

Access the 'Continuous Wiz Validation and Optimization' solution brief to learn how Cymulate empowers security teams to validate and optimize Wiz at our solution brief page.

Where can I find Cymulate's glossary of cybersecurity terms?

Cymulate provides an expanding glossary of cybersecurity terms, acronyms, and jargon at our glossary page.

Where can I find reports, blogs, and webinars from Cymulate?

Find a combination of insights, thought leadership, and product information in the Resource Hub, blog, newsroom, and events and webinars page.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

The Quickest Way to Comply with NIST Revision 5

By: Cymulate

Last Updated: May 11, 2025

cymulate blog article

NIST Special Publication (SP) 800-53A, Revision 5,Assessing Security and Privacy Controls in Information Systems and Organizations”, was published on January 25, 2022 (and supersedes the previous version). This update introduces a new format for assessment procedures designed to:

  • Improve efficiency in conducting control assessments
  • Enhance traceability between assessment procedures and controls
  • Support the use of automated tools, continuous monitoring, and ongoing authorization programs

Compliance with NIST Revision 5 requires a proactive approach to risk assessment and security validation. While the new standards impose stricter requirements, they also present business benefits, such as improved cybersecurity cost-efficiency and better alignment between security investments and risk mitigation.

How to Align Your Security Posture with NIST Revision 5

Complying with NIST’s improved standards while optimizing cybersecurity investments and demonstrating value to the board requires a structured security validation process.

Assessing an organization’s overall security posture can be done in two ways:

  1. Defensive-based assessment – Relying on detection tools and benchmark policies.
  2. Offensive-based assessment – Using data-driven exposure management for continuous assessment.

How Exposure Management and Security Validation Facilitates Complying with NIST  Revision 5 Standards 

Exposure Management and Security Validation is an approach particularly well suited to streamline compliance to the new NIST standards. Exposure Management and Security Validation platforms implement that approach by automating end-to-end risk assessment, thus challenging, assessing, and optimizing cyber-security posture simply and continuously and equipping security professionals with the visibility to know, control, and remediate their dynamic environment. 

Breaking Down NIST Revision 5: Key Security Domains

A comprehensive Continuous Security Validation approach is ideal to address all the aspects broached in Revision 5, as it covers all the sections of its chapter on procedures:

  1. Access Controls: As a subsection of security controls, can automatically be validated through regularly running simulated attack scenarios using Cymulate Breach and Attack Simulation (BAS). Cymulate BAS capabilities automatically verify that all assessment objectives, methods, and objects delineated in NIST Revision 5 are included.
  2. Awareness and Training: Cymulate built-in scenarios and campaign templates can be leveraged by a SOC to run incident response (IR) training practical exercises. The phishing awareness capability pinpoints employees needing additional awareness training. Additionally, the security gaps uncovered through the email and web gateway capabilities can be used to document awareness campaigns with examples drawn directly from employees’ behavior.
  3. Audit and Accountability: The Cymulate continuous security validation performs ongoing audits with detailed reports that increase collaboration between IT security and internal GRC and risk management teams in organizations.
  4. Assessment, Authorization, and Monitoring: The Cymulate platform continuously assesses and verifies that authorizations cannot be bypassed. The technique used is to attempt, through launching a variety of production-safe attack simulations, to find gaps in the least privileged access policy and leverage these authorization gaps to gain unauthorized access.
  5. Configuration Management: When integrated with SIEM and SOAR systems, the Cymulate platform automatically maps out misconfiguration and security gaps enabling ’attackers' intrusion and the ensuing attack path. It then provides prescriptive guidance for enhancing configuration management.
  6. Contingency Planning: The reports of attacks’ potential reach and damages yielded by IR training exercises run with Cymulate attack scenarios and campaigns can be used by SOC and the executive board as comprehensive databases to create contingency plans.
  7. Identification and Authentication: production-safe attack scenarios and campaigns are designed to exploit insufficiently tight identification and authentication policies. Reports list all detected ID or authentication security gaps and include actionable mitigation recommendations.
  8. Incident Response: Launching production-safe attack simulations enables updating IR playbooks with live production information, and setting up a TTE (Tabletop Exercise) with minimal effort.
  9. Maintenance: Access to a single source of truth for all security gaps in an organization greatly facilitates assigning maintenance roles and missions and subsequently updating those to match the dynamic nature of agile development. The Cymulate platform provides this visibility, as well as prioritization and mitigation guidance.
  10. Media Protection: Once a required level of protection for a media is defined, Cymulate can validate that it is applied and enforced across the board and raise an alert if its personnel or roles fail to implement the required procedures.
  11. Physical and Environmental Protection: This is not typically covered by the information security software and should be complemented by on-site physical measures.
  12. Planning: The overarching view of the entire environment’s exposure, including the attack surface, provides invaluable information when establishing a list of the people who should be informed of security and policy procedures and can be used to automatically update any relevant modification.
  13. The ability to define accurate granular and global baselines reflecting the organization’s risk appetite and measure its variance with precise metrics facilitates both planning and monitoring:
  14. Program Management: The information regarding SIEM and SOAR tools efficacy extracted from Cymulate assessments uncovers overlapping and missing capabilities and provides prescriptive recommendations to optimize the configuration of the available detecting, monitoring, and response solutions.
  15. Personnel Security: Same remarks as for point 9.
  16. PII (Personally Identifiable Information) processing and transparency: Same remarks as point 8.
  17. Risk Assessment: The Cymulate platform provides the highest and most comprehensive level of risk assessment attainable with today’s technology.
  18. System and Service Acquisition: The Cymulate platform can be used to comprehensively and granularly evaluate the risk introduced by granting access to an external service provider or integrating with an external system by testing the impact on the security posture during the trial period.
  19. System and Communication Protection: As the Cymulate platform identifies security gaps in the entire network, including those affecting system and communication, protecting those can be achieved by applying the mitigation recommendation provided in automatically generated reports.
  20. System and Information Integrity: same remarks as for point 15.
  21. Supply chain Risk Management: same remark as point 14, except that, instead of testing the supplier's impact on security posture during a trial posture, it would require testing the impact of momentarily disconnecting the third party.

To better understand the value of an exposure management and security validation approach, it helps to understand the fundamental differences between defensive and offensive risk assessment. 

Defensive-Based Risk Assessment 

Typically, testing is done through a combination of a yearly or bi-annual pen testing exercise and continuous adjustment to industry-recognized benchmarks, such as those published by CIS, NIST, OWASP, and others.

This approach, unfortunately, suffers from some major and minor flaws. 

Minor Flaws 

  • It does not enable measuring the ongoing efficiency of the existing tool stack, preventing tool use optimization. 
  • It does not identify potential overlap between tools, preventing tool stack rationalization. 
  • It lists all uncovered vulnerabilities and ideally prioritizes catching based on industry-wide criticality scores, not based on risks to the specific environment. 
  • Limited visibility hampers the optimization of the balance between operational agility and security concerns.

Major Flaws 

Annual or bi-annual pen testing exercises provide a snapshot of the security posture at a defined point in time. Reports are obsolete before they are handed over a few days or weeks after the exercises. This is due to:

  • The rapidly evolving malicious actors’ offensive tooling and capabilities
  • The agile nature of continuous deployment might introduce new vulnerabilities with each new deployment 
  • Without integrating continuous Immediate Alert Intelligence (ITI) in security posture management, there is no possibility of evaluating resilience against emerging attacks. 
  • Without attack-based vulnerability patching prioritization, remediation queues are overloaded, and patching priorities are misaligned with the actual risks to the environment. 
  • Lack of quantified baselines and trends hobble the efficacy of continuous monitoring in evaluating the improvement – or lack of thereof -of the security posture.

From Offensive-Based Risk Assessment to Cyber Risk Quantification 

When switching from defensive to offensive-based cyber risk assessment methodology, doing it right enables cyber risk quantification.

Cyber risk includes the realm of all impacts where you are exposing your digital and physical environments simply by interconnected people, processes, and technology. Cyber risk quantification is a method for expressing risk exposure from interconnected digital environments to the organization primarily in business terms, meaning with a direct link to its $ value. 

A comprehensive offensive-based cyber risk assessment needs to cover the entire kill-chain, from intelligence gathering and initial foothold to execution and Command & Control, and network propagation, and, of course, action on objectives such as data exfiltration. It also needs to have the capability of establishing a baseline for security control resilience.

Advanced offensive-based assessment tools, such as the Cymulate Exposure Management and Security Validation solutions, meet all the NIST increased requirement stringency for risk assessment and are invaluable in achieving compliance quickly, efficiently, and comprehensively.

As a bonus, it provides 360° visibility into the inner working of each cyber-defensive tool, from their ability to improve security controls to their detection and attack-prevention mechanisms and detailed itemized cyber risk quantification. 

Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo