Control ID Title / Statement Priority Baseline Impact
SC-1
System and Communications Protection Policy and Procedures 3 params
The organization: a. Develops, documents, and disseminates to {{ insert: param, sc-1_prm_1 }}: 1. A system and communications protection policy that addresses purpose, scope, roles, responsib...
View parameters
Param ID Label Constraint / Choices
sc-1_prm_1 organization-defined personnel or roles Organization-defined
sc-1_prm_2 organization-defined frequency Organization-defined
sc-1_prm_3 organization-defined frequency Organization-defined
SC-2
Application Partitioning
The information system separates user functionality (including user interface services) from information system management functionality.
SC-2(1)
Interfaces for Non-privileged Users
The information system prevents the presentation of information system management-related functionality at an interface for non-privileged users.
SC-3
Security Function Isolation
The information system isolates security functions from nonsecurity functions.
SC-3(1)
Hardware Separation
The information system utilizes underlying hardware separation mechanisms to implement security function isolation.
SC-3(2)
Access / Flow Control Functions
The information system isolates security functions enforcing access and information flow control from nonsecurity functions and from other security functions.
SC-3(3)
Minimize Nonsecurity Functionality
The organization minimizes the number of nonsecurity functions included within the isolation boundary containing security functions.
SC-3(4)
Module Coupling and Cohesiveness
The organization implements security functions as largely independent modules that maximize internal cohesiveness within modules and minimize coupling between modules.
SC-3(5)
Layered Structures
The organization implements security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correc...
SC-4
Information in Shared Resources
The information system prevents unauthorized and unintended information transfer via shared system resources.
SC-4(1)
Security Levels
SC-4(2)
Periods Processing 1 param
The information system prevents unauthorized information transfer via shared resources in accordance with {{ insert: param, sc-4.2_prm_1 }} when system processing explicitly switches between differ...
View parameters
Param ID Label Constraint / Choices
sc-4.2_prm_1 organization-defined procedures Organization-defined
SC-5
Denial of Service Protection 2 params
The information system protects against or limits the effects of the following types of denial of service attacks: {{ insert: param, sc-5_prm_1 }} by employing {{ insert: param, sc-5_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-5_prm_1 organization-defined types of denial of service attacks or references to sources for such information Organization-defined
sc-5_prm_2 organization-defined security safeguards Organization-defined
SC-5(1)
Restrict Internal Users 1 param
The information system restricts the ability of individuals to launch {{ insert: param, sc-5.1_prm_1 }} against other information systems.
View parameters
Param ID Label Constraint / Choices
sc-5.1_prm_1 organization-defined denial of service attacks Organization-defined
SC-5(2)
Excess Capacity / Bandwidth / Redundancy
The information system manages excess capacity, bandwidth, or other redundancy to limit the effects of information flooding denial of service attacks.
SC-5(3)
Detection / Monitoring 2 params
The organization: (a) Employs {{ insert: param, sc-5.3_prm_1 }} to detect indicators of denial of service attacks against the information system; and (b) Monitors {{ insert: param, sc-5.3_prm_2...
View parameters
Param ID Label Constraint / Choices
sc-5.3_prm_1 organization-defined monitoring tools Organization-defined
sc-5.3_prm_2 organization-defined information system resources Organization-defined
SC-6
Resource Availability 3 params
The information system protects the availability of resources by allocating {{ insert: param, sc-6_prm_1 }} by {{ insert: param, sc-6_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-6_prm_1 organization-defined resources Organization-defined
sc-6_prm_2 Select one-or-more: priority; quota; {{ insert: param, sc-6_prm_3 }}
sc-6_prm_3 organization-defined security safeguards Organization-defined
SC-7
Boundary Protection 1 param
The information system: a. Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system; b. Implements subnetworks for publicly a...
View parameters
Param ID Label Constraint / Choices
sc-7_prm_1 Select one: physically; logically
SC-7(1)
Physically Separated Subnetworks
SC-7(2)
Public Access
SC-7(3)
Access Points
The organization limits the number of external network connections to the information system.
SC-7(4)
External Telecommunications Services 1 param
The organization: (a) Implements a managed interface for each external telecommunication service; (b) Establishes a traffic flow policy for each managed interface; (c) Protects the confidenti...
View parameters
Param ID Label Constraint / Choices
sc-7.4_prm_1 organization-defined frequency Organization-defined
SC-7(5)
Deny by Default / Allow by Exception
The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception).
SC-7(6)
Response to Recognized Failures
SC-7(7)
Prevent Split Tunneling for Remote Devices
The information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection ...
SC-7(8)
Route Traffic to Authenticated Proxy Servers 2 params
The information system routes {{ insert: param, sc-7.8_prm_1 }} to {{ insert: param, sc-7.8_prm_2 }} through authenticated proxy servers at managed interfaces.
View parameters
Param ID Label Constraint / Choices
sc-7.8_prm_1 organization-defined internal communications traffic Organization-defined
sc-7.8_prm_2 organization-defined external networks Organization-defined
SC-7(9)
Restrict Threatening Outgoing Communications Traffic
The information system: (a) Detects and denies outgoing communications traffic posing a threat to external information systems; and (b) Audits the identity of internal users associated with den...
SC-7(10)
Prevent Unauthorized Exfiltration
The organization prevents the unauthorized exfiltration of information across managed interfaces.
SC-7(11)
Restrict Incoming Communications Traffic 2 params
The information system only allows incoming communications from {{ insert: param, sc-7.11_prm_1 }} to be routed to {{ insert: param, sc-7.11_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-7.11_prm_1 organization-defined authorized sources Organization-defined
sc-7.11_prm_2 organization-defined authorized destinations Organization-defined
SC-7(12)
Host-based Protection 2 params
The organization implements {{ insert: param, sc-7.12_prm_1 }} at {{ insert: param, sc-7.12_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-7.12_prm_1 organization-defined host-based boundary protection mechanisms Organization-defined
sc-7.12_prm_2 organization-defined information system components Organization-defined
SC-7(13)
Isolation of Security Tools / Mechanisms / Support Components 1 param
The organization isolates {{ insert: param, sc-7.13_prm_1 }} from other internal information system components by implementing physically separate subnetworks with managed interfaces to other compo...
View parameters
Param ID Label Constraint / Choices
sc-7.13_prm_1 organization-defined information security tools, mechanisms, and support components Organization-defined
SC-7(14)
Protects Against Unauthorized Physical Connections 1 param
The organization protects against unauthorized physical connections at {{ insert: param, sc-7.14_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-7.14_prm_1 organization-defined managed interfaces Organization-defined
SC-7(15)
Route Privileged Network Accesses
The information system routes all networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing.
SC-7(16)
Prevent Discovery of Components / Devices
The information system prevents discovery of specific system components composing a managed interface.
SC-7(17)
Automated Enforcement of Protocol Formats
The information system enforces adherence to protocol formats.
SC-7(18)
Fail Secure
The information system fails securely in the event of an operational failure of a boundary protection device.
SC-7(19)
Blocks Communication from Non-organizationally Configured Hosts 1 param
The information system blocks both inbound and outbound communications traffic between {{ insert: param, sc-7.19_prm_1 }} that are independently configured by end users and external service providers.
View parameters
Param ID Label Constraint / Choices
sc-7.19_prm_1 organization-defined communication clients Organization-defined
SC-7(20)
Dynamic Isolation / Segregation 1 param
The information system provides the capability to dynamically isolate/segregate {{ insert: param, sc-7.20_prm_1 }} from other components of the system.
View parameters
Param ID Label Constraint / Choices
sc-7.20_prm_1 organization-defined information system components Organization-defined
SC-7(21)
Isolation of Information System Components 2 params
The organization employs boundary protection mechanisms to separate {{ insert: param, sc-7.21_prm_1 }} supporting {{ insert: param, sc-7.21_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-7.21_prm_1 organization-defined information system components Organization-defined
sc-7.21_prm_2 organization-defined missions and/or business functions Organization-defined
SC-7(22)
Separate Subnets for Connecting to Different Security Domains
The information system implements separate network addresses (i.e., different subnets) to connect to systems in different security domains.
SC-7(23)
Disable Sender Feedback On Protocol Validation Failure
The information system disables feedback to senders on protocol format validation failure.
SC-8
Transmission Confidentiality and Integrity 1 param
The information system protects the {{ insert: param, sc-8_prm_1 }} of transmitted information.
View parameters
Param ID Label Constraint / Choices
sc-8_prm_1 Select one-or-more: confidentiality; integrity
SC-8(1)
Cryptographic or Alternate Physical Protection 2 params
The information system implements cryptographic mechanisms to {{ insert: param, sc-8.1_prm_1 }} during transmission unless otherwise protected by {{ insert: param, sc-8.1_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-8.1_prm_1 Select one-or-more: prevent unauthorized disclosure of information; detect changes to information
sc-8.1_prm_2 organization-defined alternative physical safeguards Organization-defined
SC-8(2)
Pre / Post Transmission Handling 1 param
The information system maintains the {{ insert: param, sc-8.2_prm_1 }} of information during preparation for transmission and during reception.
View parameters
Param ID Label Constraint / Choices
sc-8.2_prm_1 Select one-or-more: confidentiality; integrity
SC-8(3)
Cryptographic Protection for Message Externals 1 param
The information system implements cryptographic mechanisms to protect message externals unless otherwise protected by {{ insert: param, sc-8.3_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-8.3_prm_1 organization-defined alternative physical safeguards Organization-defined
SC-8(4)
Conceal / Randomize Communications 1 param
The information system implements cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by {{ insert: param, sc-8.4_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-8.4_prm_1 organization-defined alternative physical safeguards Organization-defined
SC-9
Transmission Confidentiality
SC-10
Network Disconnect 1 param
The information system terminates the network connection associated with a communications session at the end of the session or after {{ insert: param, sc-10_prm_1 }} of inactivity.
View parameters
Param ID Label Constraint / Choices
sc-10_prm_1 organization-defined time period Organization-defined
SC-11
Trusted Path 1 param
The information system establishes a trusted communications path between the user and the following security functions of the system: {{ insert: param, sc-11_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-11_prm_1 organization-defined security functions to include at a minimum, information system authentication and re-authentication Organization-defined
SC-11(1)
Logical Isolation
The information system provides a trusted communications path that is logically isolated and distinguishable from other paths.
SC-12
Cryptographic Key Establishment and Management 1 param
The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with {{ insert: param, sc-12_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-12_prm_1 organization-defined requirements for key generation, distribution, storage, access, and destruction Organization-defined
SC-12(1)
Availability
The organization maintains availability of information in the event of the loss of cryptographic keys by users.
SC-12(2)
Symmetric Keys 1 param
The organization produces, controls, and distributes symmetric cryptographic keys using {{ insert: param, sc-12.2_prm_1 }} key management technology and processes.
View parameters
Param ID Label Constraint / Choices
sc-12.2_prm_1 Select one: NIST FIPS-compliant; NSA-approved
SC-12(3)
Asymmetric Keys 1 param
The organization produces, controls, and distributes asymmetric cryptographic keys using {{ insert: param, sc-12.3_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-12.3_prm_1 Select one: NSA-approved key management technology and processes; approved PKI Class 3 certificates or prepositioned keying material; approved PKI Class 3 or Class 4 certificates and hardware security tokens that protect the user’s private key
SC-12(4)
PKI Certificates
SC-12(5)
PKI Certificates / Hardware Tokens
SC-13
Cryptographic Protection 1 param
The information system implements {{ insert: param, sc-13_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
View parameters
Param ID Label Constraint / Choices
sc-13_prm_1 organization-defined cryptographic uses and type of cryptography required for each use Organization-defined
SC-13(1)
Fips-validated Cryptography
SC-13(2)
Nsa-approved Cryptography
SC-13(3)
Individuals Without Formal Access Approvals
SC-13(4)
Digital Signatures
SC-14
Public Access Protections
SC-15
Collaborative Computing Devices 1 param
The information system: a. Prohibits remote activation of collaborative computing devices with the following exceptions: {{ insert: param, sc-15_prm_1 }}; and b. Provides an explicit indication...
View parameters
Param ID Label Constraint / Choices
sc-15_prm_1 organization-defined exceptions where remote activation is to be allowed Organization-defined
SC-15(1)
Physical Disconnect
The information system provides physical disconnect of collaborative computing devices in a manner that supports ease of use.
SC-15(2)
Blocking Inbound / Outbound Communications Traffic
SC-15(3)
Disabling / Removal in Secure Work Areas 2 params
The organization disables or removes collaborative computing devices from {{ insert: param, sc-15.3_prm_1 }} in {{ insert: param, sc-15.3_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-15.3_prm_1 organization-defined information systems or information system components Organization-defined
sc-15.3_prm_2 organization-defined secure work areas Organization-defined
SC-15(4)
Explicitly Indicate Current Participants 1 param
The information system provides an explicit indication of current participants in {{ insert: param, sc-15.4_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-15.4_prm_1 organization-defined online meetings and teleconferences Organization-defined
sc-15a Prohibits remote activation of collaborative computing devices with the following exceptions: {{ insert: param, sc-15_prm_1 }}; and
sc-15b Provides an explicit indication of use to users physically present at the devices.
SC-16
Transmission of Security Attributes 1 param
The information system associates {{ insert: param, sc-16_prm_1 }} with information exchanged between information systems and between system components.
View parameters
Param ID Label Constraint / Choices
sc-16_prm_1 organization-defined security attributes Organization-defined
SC-16(1)
Integrity Validation
The information system validates the integrity of transmitted security attributes.
SC-17
Public Key Infrastructure Certificates 1 param
The organization issues public key certificates under an {{ insert: param, sc-17_prm_1 }} or obtains public key certificates from an approved service provider.
View parameters
Param ID Label Constraint / Choices
sc-17_prm_1 organization-defined certificate policy Organization-defined
SC-18
Mobile Code
The organization: a. Defines acceptable and unacceptable mobile code and mobile code technologies; b. Establishes usage restrictions and implementation guidance for acceptable mobile code and m...
SC-18(1)
Identify Unacceptable Code / Take Corrective Actions 2 params
The information system identifies {{ insert: param, sc-18.1_prm_1 }} and takes {{ insert: param, sc-18.1_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-18.1_prm_1 organization-defined unacceptable mobile code Organization-defined
sc-18.1_prm_2 organization-defined corrective actions Organization-defined
SC-18(2)
Acquisition / Development / Use 1 param
The organization ensures that the acquisition, development, and use of mobile code to be deployed in the information system meets {{ insert: param, sc-18.2_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-18.2_prm_1 organization-defined mobile code requirements Organization-defined
SC-18(3)
Prevent Downloading / Execution 1 param
The information system prevents the download and execution of {{ insert: param, sc-18.3_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-18.3_prm_1 organization-defined unacceptable mobile code Organization-defined
SC-18(4)
Prevent Automatic Execution 2 params
The information system prevents the automatic execution of mobile code in {{ insert: param, sc-18.4_prm_1 }} and enforces {{ insert: param, sc-18.4_prm_2 }} prior to executing the code.
View parameters
Param ID Label Constraint / Choices
sc-18.4_prm_1 organization-defined software applications Organization-defined
sc-18.4_prm_2 organization-defined actions Organization-defined
SC-18(5)
Allow Execution Only in Confined Environments
The organization allows execution of permitted mobile code only in confined virtual machine environments.
sc-18a Defines acceptable and unacceptable mobile code and mobile code technologies;
sc-18b Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and
sc-18c Authorizes, monitors, and controls the use of mobile code within the information system.
SC-19
Voice Over Internet Protocol
The organization: a. Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information syst...
sc-19a Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause dam...
sc-19b Authorizes, monitors, and controls the use of VoIP within the information system.
sc-1a Develops, documents, and disseminates to {{ insert: param, sc-1_prm_1 }}:
sc-1a.1 A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among org...
sc-1a.2 Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection ...
sc-1b Reviews and updates the current:
sc-1b.1 System and communications protection policy {{ insert: param, sc-1_prm_2 }}; and
sc-1b.2 System and communications protection procedures {{ insert: param, sc-1_prm_3 }}.
SC-20
Secure Name / Address Resolution Service (authoritative Source)
The information system: a. Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to ...
SC-20(1)
Child Subspaces
SC-20(2)
Data Origin / Integrity
The information system provides data origin and integrity protection artifacts for internal name/address resolution queries.
sc-20a Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system re...
sc-20b Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of ...
SC-21
Secure Name / Address Resolution Service (recursive or Caching Resolver)
The information system requests and performs data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.
SC-21(1)
Data Origin / Integrity
SC-22
Architecture and Provisioning for Name / Address Resolution Service
The information systems that collectively provide name/address resolution service for an organization are fault-tolerant and implement internal/external role separation.
SC-23
Session Authenticity
The information system protects the authenticity of communications sessions.
SC-23(1)
Invalidate Session Identifiers at Logout
The information system invalidates session identifiers upon user logout or other session termination.
SC-23(2)
User-initiated Logouts / Message Displays
SC-23(3)
Unique Session Identifiers with Randomization 1 param
The information system generates a unique session identifier for each session with {{ insert: param, sc-23.3_prm_1 }} and recognizes only session identifiers that are system-generated.
View parameters
Param ID Label Constraint / Choices
sc-23.3_prm_1 organization-defined randomness requirements Organization-defined
SC-23(4)
Unique Session Identifiers with Randomization
SC-23(5)
Allowed Certificate Authorities 1 param
The information system only allows the use of {{ insert: param, sc-23.5_prm_1 }} for verification of the establishment of protected sessions.
View parameters
Param ID Label Constraint / Choices
sc-23.5_prm_1 organization-defined certificate authorities Organization-defined
SC-24
Fail in Known State 3 params
The information system fails to a {{ insert: param, sc-24_prm_1 }} for {{ insert: param, sc-24_prm_2 }} preserving {{ insert: param, sc-24_prm_3 }} in failure.
View parameters
Param ID Label Constraint / Choices
sc-24_prm_1 organization-defined known-state Organization-defined
sc-24_prm_2 organization-defined types of failures Organization-defined
sc-24_prm_3 organization-defined system state information Organization-defined
SC-25
Thin Nodes 1 param
The organization employs {{ insert: param, sc-25_prm_1 }} with minimal functionality and information storage.
View parameters
Param ID Label Constraint / Choices
sc-25_prm_1 organization-defined information system components Organization-defined
SC-26
Honeypots
The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.
SC-26(1)
Detection of Malicious Code
SC-27
Platform-independent Applications 1 param
The information system includes: {{ insert: param, sc-27_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-27_prm_1 organization-defined platform-independent applications Organization-defined
SC-28
Protection of Information at Rest 2 params
The information system protects the {{ insert: param, sc-28_prm_1 }} of {{ insert: param, sc-28_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-28_prm_1 Select one-or-more: confidentiality; integrity
sc-28_prm_2 organization-defined information at rest Organization-defined
SC-28(1)
Cryptographic Protection 2 params
The information system implements cryptographic mechanisms to prevent unauthorized disclosure and modification of {{ insert: param, sc-28.1_prm_1 }} on {{ insert: param, sc-28.1_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-28.1_prm_1 organization-defined information Organization-defined
sc-28.1_prm_2 organization-defined information system components Organization-defined
SC-28(2)
Off-line Storage 1 param
The organization removes from online storage and stores off-line in a secure location {{ insert: param, sc-28.2_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-28.2_prm_1 organization-defined information Organization-defined
SC-29
Heterogeneity 1 param
The organization employs a diverse set of information technologies for {{ insert: param, sc-29_prm_1 }} in the implementation of the information system.
View parameters
Param ID Label Constraint / Choices
sc-29_prm_1 organization-defined information system components Organization-defined
SC-29(1)
Virtualization Techniques 1 param
The organization employs virtualization techniques to support the deployment of a diversity of operating systems and applications that are changed {{ insert: param, sc-29.1_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-29.1_prm_1 organization-defined frequency Organization-defined
SC-30
Concealment and Misdirection 3 params
The organization employs {{ insert: param, sc-30_prm_1 }} for {{ insert: param, sc-30_prm_2 }} at {{ insert: param, sc-30_prm_3 }} to confuse and mislead adversaries.
View parameters
Param ID Label Constraint / Choices
sc-30_prm_1 organization-defined concealment and misdirection techniques Organization-defined
sc-30_prm_2 organization-defined information systems Organization-defined
sc-30_prm_3 organization-defined time periods Organization-defined
SC-30(1)
Virtualization Techniques
SC-30(2)
Randomness 1 param
The organization employs {{ insert: param, sc-30.2_prm_1 }} to introduce randomness into organizational operations and assets.
View parameters
Param ID Label Constraint / Choices
sc-30.2_prm_1 organization-defined techniques Organization-defined
SC-30(3)
Change Processing / Storage Locations 3 params
The organization changes the location of {{ insert: param, sc-30.3_prm_1 }} {{ insert: param, sc-30.3_prm_2 }}].
View parameters
Param ID Label Constraint / Choices
sc-30.3_prm_1 organization-defined processing and/or storage Organization-defined
sc-30.3_prm_2 Select one: {{ insert: param, sc-30.3_prm_3 }} ; at random time intervals
sc-30.3_prm_3 organization-defined time frequency Organization-defined
SC-30(4)
Misleading Information 1 param
The organization employs realistic, but misleading information in {{ insert: param, sc-30.4_prm_1 }} with regard to its security state or posture.
View parameters
Param ID Label Constraint / Choices
sc-30.4_prm_1 organization-defined information system components Organization-defined
SC-30(5)
Concealment of System Components 2 params
The organization employs {{ insert: param, sc-30.5_prm_1 }} to hide or conceal {{ insert: param, sc-30.5_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-30.5_prm_1 organization-defined techniques Organization-defined
sc-30.5_prm_2 organization-defined information system components Organization-defined
SC-31
Covert Channel Analysis 1 param
The organization: a. Performs a covert channel analysis to identify those aspects of communications within the information system that are potential avenues for covert {{ insert: param, sc-31_prm...
View parameters
Param ID Label Constraint / Choices
sc-31_prm_1 Select one-or-more: storage; timing
SC-31(1)
Test Covert Channels for Exploitability
The organization tests a subset of the identified covert channels to determine which channels are exploitable.
SC-31(2)
Maximum Bandwidth 2 params
The organization reduces the maximum bandwidth for identified covert {{ insert: param, sc-31.2_prm_1 }} channels to {{ insert: param, sc-31.2_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-31.2_prm_1 Select one-or-more: storage; timing
sc-31.2_prm_2 organization-defined values Organization-defined
SC-31(3)
Measure Bandwidth in Operational Environments 1 param
The organization measures the bandwidth of {{ insert: param, sc-31.3_prm_1 }} in the operational environment of the information system.
View parameters
Param ID Label Constraint / Choices
sc-31.3_prm_1 organization-defined subset of identified covert channels Organization-defined
sc-31a Performs a covert channel analysis to identify those aspects of communications within the information system that are potential avenues for covert ...
sc-31b Estimates the maximum bandwidth of those channels.
SC-32
Information System Partitioning 2 params
The organization partitions the information system into {{ insert: param, sc-32_prm_1 }} residing in separate physical domains or environments based on {{ insert: param, sc-32_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-32_prm_1 organization-defined information system components Organization-defined
sc-32_prm_2 organization-defined circumstances for physical separation of components Organization-defined
SC-33
Transmission Preparation Integrity
SC-34
Non-modifiable Executable Programs 2 params
The information system at {{ insert: param, sc-34_prm_1 }}: a. Loads and executes the operating environment from hardware-enforced, read-only media; and b. Loads and executes {{ insert: param, ...
View parameters
Param ID Label Constraint / Choices
sc-34_prm_1 organization-defined information system components Organization-defined
sc-34_prm_2 organization-defined applications Organization-defined
SC-34(1)
No Writable Storage 1 param
The organization employs {{ insert: param, sc-34.1_prm_1 }} with no writeable storage that is persistent across component restart or power on/off.
View parameters
Param ID Label Constraint / Choices
sc-34.1_prm_1 organization-defined information system components Organization-defined
SC-34(2)
Integrity Protection / Read-only Media
The organization protects the integrity of information prior to storage on read-only media and controls the media after such information has been recorded onto the media.
SC-34(3)
Hardware-based Protection 2 params
The organization: (a) Employs hardware-based, write-protect for {{ insert: param, sc-34.3_prm_1 }}; and (b) Implements specific procedures for {{ insert: param, sc-34.3_prm_2 }} to manually dis...
View parameters
Param ID Label Constraint / Choices
sc-34.3_prm_1 organization-defined information system firmware components Organization-defined
sc-34.3_prm_2 organization-defined authorized individuals Organization-defined
sc-34.3.(a) Employs hardware-based, write-protect for {{ insert: param, sc-34.3_prm_1 }}; and
sc-34.3.(b) Implements specific procedures for {{ insert: param, sc-34.3_prm_2 }} to manually disable hardware write-protect for firmware modifications and re-...
sc-34a Loads and executes the operating environment from hardware-enforced, read-only media; and
sc-34b Loads and executes {{ insert: param, sc-34_prm_2 }} from hardware-enforced, read-only media.
SC-35
Honeyclients
The information system includes components that proactively seek to identify malicious websites and/or web-based malicious code.
SC-36
Distributed Processing and Storage 1 param
The organization distributes {{ insert: param, sc-36_prm_1 }} across multiple physical locations.
View parameters
Param ID Label Constraint / Choices
sc-36_prm_1 organization-defined processing and storage Organization-defined
SC-36(1)
Polling Techniques 1 param
The organization employs polling techniques to identify potential faults, errors, or compromises to {{ insert: param, sc-36.1_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-36.1_prm_1 organization-defined distributed processing and storage components Organization-defined
SC-37
Out-of-band Channels 3 params
The organization employs {{ insert: param, sc-37_prm_1 }} for the physical delivery or electronic transmission of {{ insert: param, sc-37_prm_2 }} to {{ insert: param, sc-37_prm_3 }}.
View parameters
Param ID Label Constraint / Choices
sc-37_prm_1 organization-defined out-of-band channels Organization-defined
sc-37_prm_2 organization-defined information, information system components, or devices Organization-defined
sc-37_prm_3 organization-defined individuals or information systems Organization-defined
SC-37(1)
Ensure Delivery / Transmission 3 params
The organization employs {{ insert: param, sc-37.1_prm_1 }} to ensure that only {{ insert: param, sc-37.1_prm_2 }} receive the {{ insert: param, sc-37.1_prm_3 }}.
View parameters
Param ID Label Constraint / Choices
sc-37.1_prm_1 organization-defined security safeguards Organization-defined
sc-37.1_prm_2 organization-defined individuals or information systems Organization-defined
sc-37.1_prm_3 organization-defined information, information system components, or devices Organization-defined
SC-38
Operations Security 1 param
The organization employs {{ insert: param, sc-38_prm_1 }} to protect key organizational information throughout the system development life cycle.
View parameters
Param ID Label Constraint / Choices
sc-38_prm_1 organization-defined operations security safeguards Organization-defined
SC-39
Process Isolation
The information system maintains a separate execution domain for each executing process.
SC-39(1)
Hardware Separation
The information system implements underlying hardware separation mechanisms to facilitate process separation.
SC-39(2)
Thread Isolation 1 param
The information system maintains a separate execution domain for each thread in {{ insert: param, sc-39.2_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-39.2_prm_1 organization-defined multi-threaded processing Organization-defined
SC-40
Wireless Link Protection 2 params
The information system protects external and internal {{ insert: param, sc-40_prm_1 }} from {{ insert: param, sc-40_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-40_prm_1 organization-defined wireless links Organization-defined
sc-40_prm_2 organization-defined types of signal parameter attacks or references to sources for such attacks Organization-defined
SC-40(1)
Electromagnetic Interference 1 param
The information system implements cryptographic mechanisms that achieve {{ insert: param, sc-40.1_prm_1 }} against the effects of intentional electromagnetic interference.
View parameters
Param ID Label Constraint / Choices
sc-40.1_prm_1 organization-defined level of protection Organization-defined
SC-40(2)
Reduce Detection Potential 1 param
The information system implements cryptographic mechanisms to reduce the detection potential of wireless links to {{ insert: param, sc-40.2_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-40.2_prm_1 organization-defined level of reduction Organization-defined
SC-40(3)
Imitative or Manipulative Communications Deception
The information system implements cryptographic mechanisms to identify and reject wireless transmissions that are deliberate attempts to achieve imitative or manipulative communications deception b...
SC-40(4)
Signal Parameter Identification 1 param
The information system implements cryptographic mechanisms to prevent the identification of {{ insert: param, sc-40.4_prm_1 }} by using the transmitter signal parameters.
View parameters
Param ID Label Constraint / Choices
sc-40.4_prm_1 organization-defined wireless transmitters Organization-defined
SC-41
Port and I/O Device Access 2 params
The organization physically disables or removes {{ insert: param, sc-41_prm_1 }} on {{ insert: param, sc-41_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-41_prm_1 organization-defined connection ports or input/output devices Organization-defined
sc-41_prm_2 organization-defined information systems or information system components Organization-defined
SC-42
Sensor Capability and Data 2 params
The information system: a. Prohibits the remote activation of environmental sensing capabilities with the following exceptions: {{ insert: param, sc-42_prm_1 }}; and b. Provides an explicit ind...
View parameters
Param ID Label Constraint / Choices
sc-42_prm_1 organization-defined exceptions where remote activation of sensors is allowed Organization-defined
sc-42_prm_2 organization-defined class of users Organization-defined
SC-42(1)
Reporting to Authorized Individuals or Roles 1 param
The organization ensures that the information system is configured so that data or information collected by the {{ insert: param, sc-42.1_prm_1 }} is only reported to authorized individuals or roles.
View parameters
Param ID Label Constraint / Choices
sc-42.1_prm_1 organization-defined sensors Organization-defined
SC-42(2)
Authorized Use 2 params
The organization employs the following measures: {{ insert: param, sc-42.2_prm_1 }}, so that data or information collected by {{ insert: param, sc-42.2_prm_2 }} is only used for authorized purposes.
View parameters
Param ID Label Constraint / Choices
sc-42.2_prm_1 organization-defined measures Organization-defined
sc-42.2_prm_2 organization-defined sensors Organization-defined
SC-42(3)
Prohibit Use of Devices 2 params
The organization prohibits the use of devices possessing {{ insert: param, sc-42.3_prm_1 }} in {{ insert: param, sc-42.3_prm_2 }}.
View parameters
Param ID Label Constraint / Choices
sc-42.3_prm_1 organization-defined environmental sensing capabilities Organization-defined
sc-42.3_prm_2 organization-defined facilities, areas, or systems Organization-defined
sc-42a Prohibits the remote activation of environmental sensing capabilities with the following exceptions: {{ insert: param, sc-42_prm_1 }}; and
sc-42b Provides an explicit indication of sensor use to {{ insert: param, sc-42_prm_2 }}.
SC-43
Usage Restrictions 1 param
The organization: a. Establishes usage restrictions and implementation guidance for {{ insert: param, sc-43_prm_1 }} based on the potential to cause damage to the information system if used malic...
View parameters
Param ID Label Constraint / Choices
sc-43_prm_1 organization-defined information system components Organization-defined
sc-43a Establishes usage restrictions and implementation guidance for {{ insert: param, sc-43_prm_1 }} based on the potential to cause damage to the infor...
sc-43b Authorizes, monitors, and controls the use of such components within the information system.
SC-44
Detonation Chambers 1 param
The organization employs a detonation chamber capability within {{ insert: param, sc-44_prm_1 }}.
View parameters
Param ID Label Constraint / Choices
sc-44_prm_1 organization-defined information system, system component, or location Organization-defined
sc-5.3.(a) Employs {{ insert: param, sc-5.3_prm_1 }} to detect indicators of denial of service attacks against the information system; and
sc-5.3.(b) Monitors {{ insert: param, sc-5.3_prm_2 }} to determine if sufficient resources exist to prevent effective denial of service attacks.
sc-7.4.(a) Implements a managed interface for each external telecommunication service;
sc-7.4.(b) Establishes a traffic flow policy for each managed interface;
sc-7.4.(c) Protects the confidentiality and integrity of the information being transmitted across each interface;
sc-7.4.(d) Documents each exception to the traffic flow policy with a supporting mission/business need and duration of that need; and
sc-7.4.(e) Reviews exceptions to the traffic flow policy {{ insert: param, sc-7.4_prm_1 }} and removes exceptions that are no longer supported by an explicit ...
sc-7.9.(a) Detects and denies outgoing communications traffic posing a threat to external information systems; and
sc-7.9.(b) Audits the identity of internal users associated with denied communications.
sc-7a Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system;
sc-7b Implements subnetworks for publicly accessible system components that are {{ insert: param, sc-7_prm_1 }} separated from internal organizational ne...
sc-7c Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordan...