Catalog: NIST Special Publication 800-53 Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations | Controls: 173
| Control ID | Title / Statement | Priority | Baseline Impact | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| SC-1 |
System and Communications Protection Policy and Procedures
3 params
The organization:
a. Develops, documents, and disseminates to {{ insert: param, sc-1_prm_1 }}:
1. A system and communications protection policy that addresses purpose, scope, roles, responsib...
► View parameters
|
— | — | ||||||||||||
| SC-2 |
Application Partitioning
The information system separates user functionality (including user interface services) from information system management functionality.
|
— | — | ||||||||||||
| SC-2(1) |
Interfaces for Non-privileged Users
The information system prevents the presentation of information system management-related functionality at an interface for non-privileged users.
|
— | — | ||||||||||||
| SC-3 |
Security Function Isolation
The information system isolates security functions from nonsecurity functions.
|
— | — | ||||||||||||
| SC-3(1) |
Hardware Separation
The information system utilizes underlying hardware separation mechanisms to implement security function isolation.
|
— | — | ||||||||||||
| SC-3(2) |
Access / Flow Control Functions
The information system isolates security functions enforcing access and information flow control from nonsecurity functions and from other security functions.
|
— | — | ||||||||||||
| SC-3(3) |
Minimize Nonsecurity Functionality
The organization minimizes the number of nonsecurity functions included within the isolation boundary containing security functions.
|
— | — | ||||||||||||
| SC-3(4) |
Module Coupling and Cohesiveness
The organization implements security functions as largely independent modules that maximize internal cohesiveness within modules and minimize coupling between modules.
|
— | — | ||||||||||||
| SC-3(5) |
Layered Structures
The organization implements security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correc...
|
— | — | ||||||||||||
| SC-4 |
Information in Shared Resources
The information system prevents unauthorized and unintended information transfer via shared system resources.
|
— | — | ||||||||||||
| SC-4(1) |
Security Levels
|
— | — | ||||||||||||
| SC-4(2) |
Periods Processing
1 param
The information system prevents unauthorized information transfer via shared resources in accordance with {{ insert: param, sc-4.2_prm_1 }} when system processing explicitly switches between differ...
► View parameters
|
— | — | ||||||||||||
| SC-5 |
Denial of Service Protection
2 params
The information system protects against or limits the effects of the following types of denial of service attacks: {{ insert: param, sc-5_prm_1 }} by employing {{ insert: param, sc-5_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-5(1) |
Restrict Internal Users
1 param
The information system restricts the ability of individuals to launch {{ insert: param, sc-5.1_prm_1 }} against other information systems.
► View parameters
|
— | — | ||||||||||||
| SC-5(2) |
Excess Capacity / Bandwidth / Redundancy
The information system manages excess capacity, bandwidth, or other redundancy to limit the effects of information flooding denial of service attacks.
|
— | — | ||||||||||||
| SC-5(3) |
Detection / Monitoring
2 params
The organization:
(a) Employs {{ insert: param, sc-5.3_prm_1 }} to detect indicators of denial of service attacks against the information system; and
(b) Monitors {{ insert: param, sc-5.3_prm_2...
► View parameters
|
— | — | ||||||||||||
| SC-6 |
Resource Availability
3 params
The information system protects the availability of resources by allocating {{ insert: param, sc-6_prm_1 }} by {{ insert: param, sc-6_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-7 |
Boundary Protection
1 param
The information system:
a. Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system;
b. Implements subnetworks for publicly a...
► View parameters
|
— | — | ||||||||||||
| SC-7(1) |
Physically Separated Subnetworks
|
— | — | ||||||||||||
| SC-7(2) |
Public Access
|
— | — | ||||||||||||
| SC-7(3) |
Access Points
The organization limits the number of external network connections to the information system.
|
— | — | ||||||||||||
| SC-7(4) |
External Telecommunications Services
1 param
The organization:
(a) Implements a managed interface for each external telecommunication service;
(b) Establishes a traffic flow policy for each managed interface;
(c) Protects the confidenti...
► View parameters
|
— | — | ||||||||||||
| SC-7(5) |
Deny by Default / Allow by Exception
The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception).
|
— | — | ||||||||||||
| SC-7(6) |
Response to Recognized Failures
|
— | — | ||||||||||||
| SC-7(7) |
Prevent Split Tunneling for Remote Devices
The information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection ...
|
— | — | ||||||||||||
| SC-7(8) |
Route Traffic to Authenticated Proxy Servers
2 params
The information system routes {{ insert: param, sc-7.8_prm_1 }} to {{ insert: param, sc-7.8_prm_2 }} through authenticated proxy servers at managed interfaces.
► View parameters
|
— | — | ||||||||||||
| SC-7(9) |
Restrict Threatening Outgoing Communications Traffic
The information system:
(a) Detects and denies outgoing communications traffic posing a threat to external information systems; and
(b) Audits the identity of internal users associated with den...
|
— | — | ||||||||||||
| SC-7(10) |
Prevent Unauthorized Exfiltration
The organization prevents the unauthorized exfiltration of information across managed interfaces.
|
— | — | ||||||||||||
| SC-7(11) |
Restrict Incoming Communications Traffic
2 params
The information system only allows incoming communications from {{ insert: param, sc-7.11_prm_1 }} to be routed to {{ insert: param, sc-7.11_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-7(12) |
Host-based Protection
2 params
The organization implements {{ insert: param, sc-7.12_prm_1 }} at {{ insert: param, sc-7.12_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-7(13) |
Isolation of Security Tools / Mechanisms / Support Components
1 param
The organization isolates {{ insert: param, sc-7.13_prm_1 }} from other internal information system components by implementing physically separate subnetworks with managed interfaces to other compo...
► View parameters
|
— | — | ||||||||||||
| SC-7(14) |
Protects Against Unauthorized Physical Connections
1 param
The organization protects against unauthorized physical connections at {{ insert: param, sc-7.14_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-7(15) |
Route Privileged Network Accesses
The information system routes all networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing.
|
— | — | ||||||||||||
| SC-7(16) |
Prevent Discovery of Components / Devices
The information system prevents discovery of specific system components composing a managed interface.
|
— | — | ||||||||||||
| SC-7(17) |
Automated Enforcement of Protocol Formats
The information system enforces adherence to protocol formats.
|
— | — | ||||||||||||
| SC-7(18) |
Fail Secure
The information system fails securely in the event of an operational failure of a boundary protection device.
|
— | — | ||||||||||||
| SC-7(19) |
Blocks Communication from Non-organizationally Configured Hosts
1 param
The information system blocks both inbound and outbound communications traffic between {{ insert: param, sc-7.19_prm_1 }} that are independently configured by end users and external service providers.
► View parameters
|
— | — | ||||||||||||
| SC-7(20) |
Dynamic Isolation / Segregation
1 param
The information system provides the capability to dynamically isolate/segregate {{ insert: param, sc-7.20_prm_1 }} from other components of the system.
► View parameters
|
— | — | ||||||||||||
| SC-7(21) |
Isolation of Information System Components
2 params
The organization employs boundary protection mechanisms to separate {{ insert: param, sc-7.21_prm_1 }} supporting {{ insert: param, sc-7.21_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-7(22) |
Separate Subnets for Connecting to Different Security Domains
The information system implements separate network addresses (i.e., different subnets) to connect to systems in different security domains.
|
— | — | ||||||||||||
| SC-7(23) |
Disable Sender Feedback On Protocol Validation Failure
The information system disables feedback to senders on protocol format validation failure.
|
— | — | ||||||||||||
| SC-8 |
Transmission Confidentiality and Integrity
1 param
The information system protects the {{ insert: param, sc-8_prm_1 }} of transmitted information.
► View parameters
|
— | — | ||||||||||||
| SC-8(1) |
Cryptographic or Alternate Physical Protection
2 params
The information system implements cryptographic mechanisms to {{ insert: param, sc-8.1_prm_1 }} during transmission unless otherwise protected by {{ insert: param, sc-8.1_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-8(2) |
Pre / Post Transmission Handling
1 param
The information system maintains the {{ insert: param, sc-8.2_prm_1 }} of information during preparation for transmission and during reception.
► View parameters
|
— | — | ||||||||||||
| SC-8(3) |
Cryptographic Protection for Message Externals
1 param
The information system implements cryptographic mechanisms to protect message externals unless otherwise protected by {{ insert: param, sc-8.3_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-8(4) |
Conceal / Randomize Communications
1 param
The information system implements cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by {{ insert: param, sc-8.4_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-9 |
Transmission Confidentiality
|
— | — | ||||||||||||
| SC-10 |
Network Disconnect
1 param
The information system terminates the network connection associated with a communications session at the end of the session or after {{ insert: param, sc-10_prm_1 }} of inactivity.
► View parameters
|
— | — | ||||||||||||
| SC-11 |
Trusted Path
1 param
The information system establishes a trusted communications path between the user and the following security functions of the system: {{ insert: param, sc-11_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-11(1) |
Logical Isolation
The information system provides a trusted communications path that is logically isolated and distinguishable from other paths.
|
— | — | ||||||||||||
| SC-12 |
Cryptographic Key Establishment and Management
1 param
The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with {{ insert: param, sc-12_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-12(1) |
Availability
The organization maintains availability of information in the event of the loss of cryptographic keys by users.
|
— | — | ||||||||||||
| SC-12(2) |
Symmetric Keys
1 param
The organization produces, controls, and distributes symmetric cryptographic keys using {{ insert: param, sc-12.2_prm_1 }} key management technology and processes.
► View parameters
|
— | — | ||||||||||||
| SC-12(3) |
Asymmetric Keys
1 param
The organization produces, controls, and distributes asymmetric cryptographic keys using {{ insert: param, sc-12.3_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-12(4) |
PKI Certificates
|
— | — | ||||||||||||
| SC-12(5) |
PKI Certificates / Hardware Tokens
|
— | — | ||||||||||||
| SC-13 |
Cryptographic Protection
1 param
The information system implements {{ insert: param, sc-13_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
► View parameters
|
— | — | ||||||||||||
| SC-13(1) |
Fips-validated Cryptography
|
— | — | ||||||||||||
| SC-13(2) |
Nsa-approved Cryptography
|
— | — | ||||||||||||
| SC-13(3) |
Individuals Without Formal Access Approvals
|
— | — | ||||||||||||
| SC-13(4) |
Digital Signatures
|
— | — | ||||||||||||
| SC-14 |
Public Access Protections
|
— | — | ||||||||||||
| SC-15 |
Collaborative Computing Devices
1 param
The information system:
a. Prohibits remote activation of collaborative computing devices with the following exceptions: {{ insert: param, sc-15_prm_1 }}; and
b. Provides an explicit indication...
► View parameters
|
— | — | ||||||||||||
| SC-15(1) |
Physical Disconnect
The information system provides physical disconnect of collaborative computing devices in a manner that supports ease of use.
|
— | — | ||||||||||||
| SC-15(2) |
Blocking Inbound / Outbound Communications Traffic
|
— | — | ||||||||||||
| SC-15(3) |
Disabling / Removal in Secure Work Areas
2 params
The organization disables or removes collaborative computing devices from {{ insert: param, sc-15.3_prm_1 }} in {{ insert: param, sc-15.3_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-15(4) |
Explicitly Indicate Current Participants
1 param
The information system provides an explicit indication of current participants in {{ insert: param, sc-15.4_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| └ sc-15a | Prohibits remote activation of collaborative computing devices with the following exceptions: {{ insert: param, sc-15_prm_1 }}; and | — | — | ||||||||||||
| └ sc-15b | Provides an explicit indication of use to users physically present at the devices. | — | — | ||||||||||||
| SC-16 |
Transmission of Security Attributes
1 param
The information system associates {{ insert: param, sc-16_prm_1 }} with information exchanged between information systems and between system components.
► View parameters
|
— | — | ||||||||||||
| SC-16(1) |
Integrity Validation
The information system validates the integrity of transmitted security attributes.
|
— | — | ||||||||||||
| SC-17 |
Public Key Infrastructure Certificates
1 param
The organization issues public key certificates under an {{ insert: param, sc-17_prm_1 }} or obtains public key certificates from an approved service provider.
► View parameters
|
— | — | ||||||||||||
| SC-18 |
Mobile Code
The organization:
a. Defines acceptable and unacceptable mobile code and mobile code technologies;
b. Establishes usage restrictions and implementation guidance for acceptable mobile code and m...
|
— | — | ||||||||||||
| SC-18(1) |
Identify Unacceptable Code / Take Corrective Actions
2 params
The information system identifies {{ insert: param, sc-18.1_prm_1 }} and takes {{ insert: param, sc-18.1_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-18(2) |
Acquisition / Development / Use
1 param
The organization ensures that the acquisition, development, and use of mobile code to be deployed in the information system meets {{ insert: param, sc-18.2_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-18(3) |
Prevent Downloading / Execution
1 param
The information system prevents the download and execution of {{ insert: param, sc-18.3_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-18(4) |
Prevent Automatic Execution
2 params
The information system prevents the automatic execution of mobile code in {{ insert: param, sc-18.4_prm_1 }} and enforces {{ insert: param, sc-18.4_prm_2 }} prior to executing the code.
► View parameters
|
— | — | ||||||||||||
| SC-18(5) |
Allow Execution Only in Confined Environments
The organization allows execution of permitted mobile code only in confined virtual machine environments.
|
— | — | ||||||||||||
| └ sc-18a | Defines acceptable and unacceptable mobile code and mobile code technologies; | — | — | ||||||||||||
| └ sc-18b | Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and | — | — | ||||||||||||
| └ sc-18c | Authorizes, monitors, and controls the use of mobile code within the information system. | — | — | ||||||||||||
| SC-19 |
Voice Over Internet Protocol
The organization:
a. Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information syst...
|
— | — | ||||||||||||
| └ sc-19a | Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause dam... | — | — | ||||||||||||
| └ sc-19b | Authorizes, monitors, and controls the use of VoIP within the information system. | — | — | ||||||||||||
| └ sc-1a | Develops, documents, and disseminates to {{ insert: param, sc-1_prm_1 }}: | — | — | ||||||||||||
| └ sc-1a.1 | A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among org... | — | — | ||||||||||||
| └ sc-1a.2 | Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection ... | — | — | ||||||||||||
| └ sc-1b | Reviews and updates the current: | — | — | ||||||||||||
| └ sc-1b.1 | System and communications protection policy {{ insert: param, sc-1_prm_2 }}; and | — | — | ||||||||||||
| └ sc-1b.2 | System and communications protection procedures {{ insert: param, sc-1_prm_3 }}. | — | — | ||||||||||||
| SC-20 |
Secure Name / Address Resolution Service (authoritative Source)
The information system:
a. Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to ...
|
— | — | ||||||||||||
| SC-20(1) |
Child Subspaces
|
— | — | ||||||||||||
| SC-20(2) |
Data Origin / Integrity
The information system provides data origin and integrity protection artifacts for internal name/address resolution queries.
|
— | — | ||||||||||||
| └ sc-20a | Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system re... | — | — | ||||||||||||
| └ sc-20b | Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of ... | — | — | ||||||||||||
| SC-21 |
Secure Name / Address Resolution Service (recursive or Caching Resolver)
The information system requests and performs data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.
|
— | — | ||||||||||||
| SC-21(1) |
Data Origin / Integrity
|
— | — | ||||||||||||
| SC-22 |
Architecture and Provisioning for Name / Address Resolution Service
The information systems that collectively provide name/address resolution service for an organization are fault-tolerant and implement internal/external role separation.
|
— | — | ||||||||||||
| SC-23 |
Session Authenticity
The information system protects the authenticity of communications sessions.
|
— | — | ||||||||||||
| SC-23(1) |
Invalidate Session Identifiers at Logout
The information system invalidates session identifiers upon user logout or other session termination.
|
— | — | ||||||||||||
| SC-23(2) |
User-initiated Logouts / Message Displays
|
— | — | ||||||||||||
| SC-23(3) |
Unique Session Identifiers with Randomization
1 param
The information system generates a unique session identifier for each session with {{ insert: param, sc-23.3_prm_1 }} and recognizes only session identifiers that are system-generated.
► View parameters
|
— | — | ||||||||||||
| SC-23(4) |
Unique Session Identifiers with Randomization
|
— | — | ||||||||||||
| SC-23(5) |
Allowed Certificate Authorities
1 param
The information system only allows the use of {{ insert: param, sc-23.5_prm_1 }} for verification of the establishment of protected sessions.
► View parameters
|
— | — | ||||||||||||
| SC-24 |
Fail in Known State
3 params
The information system fails to a {{ insert: param, sc-24_prm_1 }} for {{ insert: param, sc-24_prm_2 }} preserving {{ insert: param, sc-24_prm_3 }} in failure.
► View parameters
|
— | — | ||||||||||||
| SC-25 |
Thin Nodes
1 param
The organization employs {{ insert: param, sc-25_prm_1 }} with minimal functionality and information storage.
► View parameters
|
— | — | ||||||||||||
| SC-26 |
Honeypots
The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.
|
— | — | ||||||||||||
| SC-26(1) |
Detection of Malicious Code
|
— | — | ||||||||||||
| SC-27 |
Platform-independent Applications
1 param
The information system includes: {{ insert: param, sc-27_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-28 |
Protection of Information at Rest
2 params
The information system protects the {{ insert: param, sc-28_prm_1 }} of {{ insert: param, sc-28_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-28(1) |
Cryptographic Protection
2 params
The information system implements cryptographic mechanisms to prevent unauthorized disclosure and modification of {{ insert: param, sc-28.1_prm_1 }} on {{ insert: param, sc-28.1_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-28(2) |
Off-line Storage
1 param
The organization removes from online storage and stores off-line in a secure location {{ insert: param, sc-28.2_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-29 |
Heterogeneity
1 param
The organization employs a diverse set of information technologies for {{ insert: param, sc-29_prm_1 }} in the implementation of the information system.
► View parameters
|
— | — | ||||||||||||
| SC-29(1) |
Virtualization Techniques
1 param
The organization employs virtualization techniques to support the deployment of a diversity of operating systems and applications that are changed {{ insert: param, sc-29.1_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-30 |
Concealment and Misdirection
3 params
The organization employs {{ insert: param, sc-30_prm_1 }} for {{ insert: param, sc-30_prm_2 }} at {{ insert: param, sc-30_prm_3 }} to confuse and mislead adversaries.
► View parameters
|
— | — | ||||||||||||
| SC-30(1) |
Virtualization Techniques
|
— | — | ||||||||||||
| SC-30(2) |
Randomness
1 param
The organization employs {{ insert: param, sc-30.2_prm_1 }} to introduce randomness into organizational operations and assets.
► View parameters
|
— | — | ||||||||||||
| SC-30(3) |
Change Processing / Storage Locations
3 params
The organization changes the location of {{ insert: param, sc-30.3_prm_1 }} {{ insert: param, sc-30.3_prm_2 }}].
► View parameters
|
— | — | ||||||||||||
| SC-30(4) |
Misleading Information
1 param
The organization employs realistic, but misleading information in {{ insert: param, sc-30.4_prm_1 }} with regard to its security state or posture.
► View parameters
|
— | — | ||||||||||||
| SC-30(5) |
Concealment of System Components
2 params
The organization employs {{ insert: param, sc-30.5_prm_1 }} to hide or conceal {{ insert: param, sc-30.5_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-31 |
Covert Channel Analysis
1 param
The organization:
a. Performs a covert channel analysis to identify those aspects of communications within the information system that are potential avenues for covert {{ insert: param, sc-31_prm...
► View parameters
|
— | — | ||||||||||||
| SC-31(1) |
Test Covert Channels for Exploitability
The organization tests a subset of the identified covert channels to determine which channels are exploitable.
|
— | — | ||||||||||||
| SC-31(2) |
Maximum Bandwidth
2 params
The organization reduces the maximum bandwidth for identified covert {{ insert: param, sc-31.2_prm_1 }} channels to {{ insert: param, sc-31.2_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-31(3) |
Measure Bandwidth in Operational Environments
1 param
The organization measures the bandwidth of {{ insert: param, sc-31.3_prm_1 }} in the operational environment of the information system.
► View parameters
|
— | — | ||||||||||||
| └ sc-31a | Performs a covert channel analysis to identify those aspects of communications within the information system that are potential avenues for covert ... | — | — | ||||||||||||
| └ sc-31b | Estimates the maximum bandwidth of those channels. | — | — | ||||||||||||
| SC-32 |
Information System Partitioning
2 params
The organization partitions the information system into {{ insert: param, sc-32_prm_1 }} residing in separate physical domains or environments based on {{ insert: param, sc-32_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-33 |
Transmission Preparation Integrity
|
— | — | ||||||||||||
| SC-34 |
Non-modifiable Executable Programs
2 params
The information system at {{ insert: param, sc-34_prm_1 }}:
a. Loads and executes the operating environment from hardware-enforced, read-only media; and
b. Loads and executes {{ insert: param, ...
► View parameters
|
— | — | ||||||||||||
| SC-34(1) |
No Writable Storage
1 param
The organization employs {{ insert: param, sc-34.1_prm_1 }} with no writeable storage that is persistent across component restart or power on/off.
► View parameters
|
— | — | ||||||||||||
| SC-34(2) |
Integrity Protection / Read-only Media
The organization protects the integrity of information prior to storage on read-only media and controls the media after such information has been recorded onto the media.
|
— | — | ||||||||||||
| SC-34(3) |
Hardware-based Protection
2 params
The organization:
(a) Employs hardware-based, write-protect for {{ insert: param, sc-34.3_prm_1 }}; and
(b) Implements specific procedures for {{ insert: param, sc-34.3_prm_2 }} to manually dis...
► View parameters
|
— | — | ||||||||||||
| └ sc-34.3.(a) | Employs hardware-based, write-protect for {{ insert: param, sc-34.3_prm_1 }}; and | — | — | ||||||||||||
| └ sc-34.3.(b) | Implements specific procedures for {{ insert: param, sc-34.3_prm_2 }} to manually disable hardware write-protect for firmware modifications and re-... | — | — | ||||||||||||
| └ sc-34a | Loads and executes the operating environment from hardware-enforced, read-only media; and | — | — | ||||||||||||
| └ sc-34b | Loads and executes {{ insert: param, sc-34_prm_2 }} from hardware-enforced, read-only media. | — | — | ||||||||||||
| SC-35 |
Honeyclients
The information system includes components that proactively seek to identify malicious websites and/or web-based malicious code.
|
— | — | ||||||||||||
| SC-36 |
Distributed Processing and Storage
1 param
The organization distributes {{ insert: param, sc-36_prm_1 }} across multiple physical locations.
► View parameters
|
— | — | ||||||||||||
| SC-36(1) |
Polling Techniques
1 param
The organization employs polling techniques to identify potential faults, errors, or compromises to {{ insert: param, sc-36.1_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-37 |
Out-of-band Channels
3 params
The organization employs {{ insert: param, sc-37_prm_1 }} for the physical delivery or electronic transmission of {{ insert: param, sc-37_prm_2 }} to {{ insert: param, sc-37_prm_3 }}.
► View parameters
|
— | — | ||||||||||||
| SC-37(1) |
Ensure Delivery / Transmission
3 params
The organization employs {{ insert: param, sc-37.1_prm_1 }} to ensure that only {{ insert: param, sc-37.1_prm_2 }} receive the {{ insert: param, sc-37.1_prm_3 }}.
► View parameters
|
— | — | ||||||||||||
| SC-38 |
Operations Security
1 param
The organization employs {{ insert: param, sc-38_prm_1 }} to protect key organizational information throughout the system development life cycle.
► View parameters
|
— | — | ||||||||||||
| SC-39 |
Process Isolation
The information system maintains a separate execution domain for each executing process.
|
— | — | ||||||||||||
| SC-39(1) |
Hardware Separation
The information system implements underlying hardware separation mechanisms to facilitate process separation.
|
— | — | ||||||||||||
| SC-39(2) |
Thread Isolation
1 param
The information system maintains a separate execution domain for each thread in {{ insert: param, sc-39.2_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-40 |
Wireless Link Protection
2 params
The information system protects external and internal {{ insert: param, sc-40_prm_1 }} from {{ insert: param, sc-40_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-40(1) |
Electromagnetic Interference
1 param
The information system implements cryptographic mechanisms that achieve {{ insert: param, sc-40.1_prm_1 }} against the effects of intentional electromagnetic interference.
► View parameters
|
— | — | ||||||||||||
| SC-40(2) |
Reduce Detection Potential
1 param
The information system implements cryptographic mechanisms to reduce the detection potential of wireless links to {{ insert: param, sc-40.2_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| SC-40(3) |
Imitative or Manipulative Communications Deception
The information system implements cryptographic mechanisms to identify and reject wireless transmissions that are deliberate attempts to achieve imitative or manipulative communications deception b...
|
— | — | ||||||||||||
| SC-40(4) |
Signal Parameter Identification
1 param
The information system implements cryptographic mechanisms to prevent the identification of {{ insert: param, sc-40.4_prm_1 }} by using the transmitter signal parameters.
► View parameters
|
— | — | ||||||||||||
| SC-41 |
Port and I/O Device Access
2 params
The organization physically disables or removes {{ insert: param, sc-41_prm_1 }} on {{ insert: param, sc-41_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| SC-42 |
Sensor Capability and Data
2 params
The information system:
a. Prohibits the remote activation of environmental sensing capabilities with the following exceptions: {{ insert: param, sc-42_prm_1 }}; and
b. Provides an explicit ind...
► View parameters
|
— | — | ||||||||||||
| SC-42(1) |
Reporting to Authorized Individuals or Roles
1 param
The organization ensures that the information system is configured so that data or information collected by the {{ insert: param, sc-42.1_prm_1 }} is only reported to authorized individuals or roles.
► View parameters
|
— | — | ||||||||||||
| SC-42(2) |
Authorized Use
2 params
The organization employs the following measures: {{ insert: param, sc-42.2_prm_1 }}, so that data or information collected by {{ insert: param, sc-42.2_prm_2 }} is only used for authorized purposes.
► View parameters
|
— | — | ||||||||||||
| SC-42(3) |
Prohibit Use of Devices
2 params
The organization prohibits the use of devices possessing {{ insert: param, sc-42.3_prm_1 }} in {{ insert: param, sc-42.3_prm_2 }}.
► View parameters
|
— | — | ||||||||||||
| └ sc-42a | Prohibits the remote activation of environmental sensing capabilities with the following exceptions: {{ insert: param, sc-42_prm_1 }}; and | — | — | ||||||||||||
| └ sc-42b | Provides an explicit indication of sensor use to {{ insert: param, sc-42_prm_2 }}. | — | — | ||||||||||||
| SC-43 |
Usage Restrictions
1 param
The organization:
a. Establishes usage restrictions and implementation guidance for {{ insert: param, sc-43_prm_1 }} based on the potential to cause damage to the information system if used malic...
► View parameters
|
— | — | ||||||||||||
| └ sc-43a | Establishes usage restrictions and implementation guidance for {{ insert: param, sc-43_prm_1 }} based on the potential to cause damage to the infor... | — | — | ||||||||||||
| └ sc-43b | Authorizes, monitors, and controls the use of such components within the information system. | — | — | ||||||||||||
| SC-44 |
Detonation Chambers
1 param
The organization employs a detonation chamber capability within {{ insert: param, sc-44_prm_1 }}.
► View parameters
|
— | — | ||||||||||||
| └ sc-5.3.(a) | Employs {{ insert: param, sc-5.3_prm_1 }} to detect indicators of denial of service attacks against the information system; and | — | — | ||||||||||||
| └ sc-5.3.(b) | Monitors {{ insert: param, sc-5.3_prm_2 }} to determine if sufficient resources exist to prevent effective denial of service attacks. | — | — | ||||||||||||
| └ sc-7.4.(a) | Implements a managed interface for each external telecommunication service; | — | — | ||||||||||||
| └ sc-7.4.(b) | Establishes a traffic flow policy for each managed interface; | — | — | ||||||||||||
| └ sc-7.4.(c) | Protects the confidentiality and integrity of the information being transmitted across each interface; | — | — | ||||||||||||
| └ sc-7.4.(d) | Documents each exception to the traffic flow policy with a supporting mission/business need and duration of that need; and | — | — | ||||||||||||
| └ sc-7.4.(e) | Reviews exceptions to the traffic flow policy {{ insert: param, sc-7.4_prm_1 }} and removes exceptions that are no longer supported by an explicit ... | — | — | ||||||||||||
| └ sc-7.9.(a) | Detects and denies outgoing communications traffic posing a threat to external information systems; and | — | — | ||||||||||||
| └ sc-7.9.(b) | Audits the identity of internal users associated with denied communications. | — | — | ||||||||||||
| └ sc-7a | Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system; | — | — | ||||||||||||
| └ sc-7b | Implements subnetworks for publicly accessible system components that are {{ insert: param, sc-7_prm_1 }} separated from internal organizational ne... | — | — | ||||||||||||
| └ sc-7c | Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordan... | — | — |