Catalog: Electronic (OSCAL) Version of NIST SP 800-53 Rev 5.2.0 Controls and SP 800-53A Rev 5.2.0 Assessment Procedures | Controls: 224
| Control ID | Title / Statement | Priority | Baseline Impact | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| SC-01 |
Policy and Procedures
9 params
a. Develop, document, and disseminate to {{ insert: param, sc-1_prm_1 }}:
1. {{ insert: param, sc-01_odp.03 }} system and communications protection policy that:
(a) Addresses purpose, s...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-02 |
Separation of System and User Functionality
Separate user functionality, including user interface services, from system management functionality.
|
— | — | ||||||||||||||||||||||||||||||
| SC-02(01) |
Interfaces for Non-privileged Users
Prevent the presentation of system management functionality at interfaces to non-privileged users.
|
— | — | ||||||||||||||||||||||||||||||
| SC-02(02) |
Disassociability
Store state information from applications and software separately.
|
— | — | ||||||||||||||||||||||||||||||
| SC-03 |
Security Function Isolation
Isolate security functions from nonsecurity functions.
|
— | — | ||||||||||||||||||||||||||||||
| SC-03(01) |
Hardware Separation
Employ hardware separation mechanisms to implement security function isolation.
|
— | — | ||||||||||||||||||||||||||||||
| SC-03(02) |
Access and Flow Control Functions
Isolate security functions enforcing access and information flow control from nonsecurity functions and from other security functions.
|
— | — | ||||||||||||||||||||||||||||||
| SC-03(03) |
Minimize Nonsecurity Functionality
Minimize the number of nonsecurity functions included within the isolation boundary containing security functions.
|
— | — | ||||||||||||||||||||||||||||||
| SC-03(04) |
Module Coupling and Cohesiveness
Implement security functions as largely independent modules that maximize internal cohesiveness within modules and minimize coupling between modules.
|
— | — | ||||||||||||||||||||||||||||||
| SC-03(05) |
Layered Structures
Implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher la...
|
— | — | ||||||||||||||||||||||||||||||
| SC-04 |
Information in Shared System Resources
Prevent unauthorized and unintended information transfer via shared system resources.
|
— | — | ||||||||||||||||||||||||||||||
| SC-04(01) |
Security Levels
|
— | — | ||||||||||||||||||||||||||||||
| SC-04(02) |
Multilevel or Periods Processing
1 param
Prevent unauthorized information transfer via shared resources in accordance with {{ insert: param, sc-04.02_odp }} when system processing explicitly switches between different information classifi...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-05 |
Denial-of-service Protection
3 params
a. {{ insert: param, sc-05_odp.02 }} the effects of the following types of denial-of-service events: {{ insert: param, sc-05_odp.01 }} ; and
b. Employ the following controls to achieve the deni...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-05(01) |
Restrict Ability to Attack Other Systems
1 param
Restrict the ability of individuals to launch the following denial-of-service attacks against other systems: {{ insert: param, sc-05.01_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-05(02) |
Capacity, Bandwidth, and Redundancy
Manage capacity, bandwidth, or other redundancy to limit the effects of information flooding denial-of-service attacks.
|
— | — | ||||||||||||||||||||||||||||||
| SC-05(03) |
Detection and Monitoring
2 params
(a) Employ the following monitoring tools to detect indicators of denial-of-service attacks against, or launched from, the system: {{ insert: param, sc-05.03_odp.01 }} ; and
(b) Monitor the fol...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-06 |
Resource Availability
3 params
Protect the availability of resources by allocating {{ insert: param, sc-06_odp.01 }} by {{ insert: param, sc-06_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07 |
Boundary Protection
1 param
a. Monitor and control communications at the external managed interfaces to the system and at key internal managed interfaces within the system;
b. Implement subnetworks for publicly accessible...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(01) |
Physically Separated Subnetworks
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(02) |
Public Access
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(03) |
Access Points
Limit the number of external network connections to the system.
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(04) |
External Telecommunications Services
1 param
(a) Implement a managed interface for each external telecommunication service;
(b) Establish a traffic flow policy for each managed interface;
(c) Protect the confidentiality and integrity of...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(05) |
Deny by Default — Allow by Exception
2 params
Deny network communications traffic by default and allow network communications traffic by exception {{ insert: param, sc-07.05_odp.01 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(06) |
Response to Recognized Failures
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(07) |
Split Tunneling for Remote Devices
1 param
Prevent split tunneling for remote devices connecting to organizational systems unless the split tunnel is securely provisioned using {{ insert: param, sc-07.07_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(08) |
Route Traffic to Authenticated Proxy Servers
2 params
Route {{ insert: param, sc-07.08_odp.01 }} to {{ insert: param, sc-07.08_odp.02 }} through authenticated proxy servers at managed interfaces.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(09) |
Restrict Threatening Outgoing Communications Traffic
(a) Detect and deny outgoing communications traffic posing a threat to external systems; and
(b) Audit the identity of internal users associated with denied communications.
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(10) |
Prevent Exfiltration
1 param
(a) Prevent the exfiltration of information; and
(b) Conduct exfiltration tests {{ insert: param, sc-07.10_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(11) |
Restrict Incoming Communications Traffic
2 params
Only allow incoming communications from {{ insert: param, sc-07.11_odp.01 }} to be routed to {{ insert: param, sc-07.11_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(12) |
Host-based Protection
2 params
Implement {{ insert: param, sc-07.12_odp.01 }} at {{ insert: param, sc-07.12_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(13) |
Isolation of Security Tools, Mechanisms, and Support Components
1 param
Isolate {{ insert: param, sc-07.13_odp }} from other internal system components by implementing physically separate subnetworks with managed interfaces to other components of the system.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(14) |
Protect Against Unauthorized Physical Connections
1 param
Protect against unauthorized physical connections at {{ insert: param, sc-07.14_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(15) |
Networked Privileged Accesses
Route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing.
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(16) |
Prevent Discovery of System Components
Prevent the discovery of specific system components that represent a managed interface.
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(17) |
Automated Enforcement of Protocol Formats
Enforce adherence to protocol formats.
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(18) |
Fail Secure
Prevent systems from entering unsecure states in the event of an operational failure of a boundary protection device.
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(19) |
Block Communication from Non-organizationally Configured Hosts
1 param
Block inbound and outbound communications traffic between {{ insert: param, sc-07.19_odp }} that are independently configured by end users and external service providers.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(20) |
Dynamic Isolation and Segregation
1 param
Provide the capability to dynamically isolate {{ insert: param, sc-07.20_odp }} from other system components.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(21) |
Isolation of System Components
2 params
Employ boundary protection mechanisms to isolate {{ insert: param, sc-07.21_odp.01 }} supporting {{ insert: param, sc-07.21_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(22) |
Separate Subnets for Connecting to Different Security Domains
Implement separate network addresses to connect to systems in different security domains.
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(23) |
Disable Sender Feedback on Protocol Validation Failure
Disable feedback to senders on protocol format validation failure.
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(24) |
Personally Identifiable Information
1 param
For systems that process personally identifiable information:
(a) Apply the following processing rules to data elements of personally identifiable information: {{ insert: param, sc-07.24_odp }};
...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(25) |
Unclassified National Security System Connections
2 params
Prohibit the direct connection of {{ insert: param, sc-07.25_odp.01 }} to an external network without the use of {{ insert: param, sc-07.25_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(26) |
Classified National Security System Connections
1 param
Prohibit the direct connection of a classified national security system to an external network without the use of {{ insert: param, sc-07.26_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(27) |
Unclassified Non-national Security System Connections
2 params
Prohibit the direct connection of {{ insert: param, sc-07.27_odp.01 }} to an external network without the use of {{ insert: param, sc-07.27_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(28) |
Connections to Public Networks
1 param
Prohibit the direct connection of {{ insert: param, sc-07.28_odp }} to a public network.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-07(29) |
Separate Subnets to Isolate Functions
2 params
Implement {{ insert: param, sc-07.29_odp.01 }} separate subnetworks to isolate the following critical system components and functions: {{ insert: param, sc-07.29_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-08 |
Transmission Confidentiality and Integrity
1 param
Protect the {{ insert: param, sc-08_odp }} of transmitted information.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-08(01) |
Cryptographic Protection
1 param
Implement cryptographic mechanisms to {{ insert: param, sc-08.01_odp }} during transmission.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-08(02) |
Pre- and Post-transmission Handling
1 param
Maintain the {{ insert: param, sc-08.02_odp }} of information during preparation for transmission and during reception.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-08(03) |
Cryptographic Protection for Message Externals
1 param
Implement cryptographic mechanisms to protect message externals unless otherwise protected by {{ insert: param, sc-08.03_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-08(04) |
Conceal or Randomize Communications
1 param
Implement cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by {{ insert: param, sc-08.04_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-08(05) |
Protected Distribution System
2 params
Implement {{ insert: param, sc-08.05_odp.01 }} to {{ insert: param, sc-08.05_odp.02 }} during transmission.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-09 |
Transmission Confidentiality
|
— | — | ||||||||||||||||||||||||||||||
| SC-10 |
Network Disconnect
1 param
Terminate the network connection associated with a communications session at the end of the session or after {{ insert: param, sc-10_odp }} of inactivity.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-11 |
Trusted Path
2 params
a. Provide a {{ insert: param, sc-11_odp.01 }} isolated trusted communications path for communications between the user and the trusted components of the system; and
b. Permit users to invoke t...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-11(01) |
Irrefutable Communications Path
1 param
(a) Provide a trusted communications path that is irrefutably distinguishable from other communications paths; and
(b) Initiate the trusted communications path for communications between the {{...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-11.1.(a) | Provide a trusted communications path that is irrefutably distinguishable from other communications paths; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-11.1.(b) | Initiate the trusted communications path for communications between the {{ insert: param, sc-11.01_odp }} of the system and the user. | — | — | ||||||||||||||||||||||||||||||
| └ sc-11a | Provide a {{ insert: param, sc-11_odp.01 }} isolated trusted communications path for communications between the user and the trusted components of ... | — | — | ||||||||||||||||||||||||||||||
| └ sc-11b | Permit users to invoke the trusted communications path for communications between the user and the following security functions of the system, incl... | — | — | ||||||||||||||||||||||||||||||
| SC-12 |
Cryptographic Key Establishment and Management
1 param
Establish and manage cryptographic keys when cryptography is employed within the system in accordance with the following key management requirements: {{ insert: param, sc-12_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-12(01) |
Availability
Maintain availability of information in the event of the loss of cryptographic keys by users.
|
— | — | ||||||||||||||||||||||||||||||
| SC-12(02) |
Symmetric Keys
1 param
Produce, control, and distribute symmetric cryptographic keys using {{ insert: param, sc-12.02_odp }} key management technology and processes.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-12(03) |
Asymmetric Keys
1 param
Produce, control, and distribute asymmetric cryptographic keys using {{ insert: param, sc-12.03_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-12(04) |
PKI Certificates
|
— | — | ||||||||||||||||||||||||||||||
| SC-12(05) |
PKI Certificates / Hardware Tokens
|
— | — | ||||||||||||||||||||||||||||||
| SC-12(06) |
Physical Control of Keys
Maintain physical control of cryptographic keys when stored information is encrypted by external service providers.
|
— | — | ||||||||||||||||||||||||||||||
| SC-13 |
Cryptographic Protection
2 params
a. Determine the {{ insert: param, sc-13_odp.01 }} ; and
b. Implement the following types of cryptography required for each specified cryptographic use: {{ insert: param, sc-13_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-13(01) |
FIPS-validated Cryptography
|
— | — | ||||||||||||||||||||||||||||||
| SC-13(02) |
NSA-approved Cryptography
|
— | — | ||||||||||||||||||||||||||||||
| SC-13(03) |
Individuals Without Formal Access Approvals
|
— | — | ||||||||||||||||||||||||||||||
| SC-13(04) |
Digital Signatures
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-13a | Determine the {{ insert: param, sc-13_odp.01 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-13b | Implement the following types of cryptography required for each specified cryptographic use: {{ insert: param, sc-13_odp.02 }}. | — | — | ||||||||||||||||||||||||||||||
| SC-14 |
Public Access Protections
|
— | — | ||||||||||||||||||||||||||||||
| SC-15 |
Collaborative Computing Devices and Applications
1 param
a. Prohibit remote activation of collaborative computing devices and applications with the following exceptions: {{ insert: param, sc-15_odp }} ; and
b. Provide an explicit indication of use to...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-15(01) |
Physical or Logical Disconnect
1 param
Provide {{ insert: param, sc-15.01_odp }} disconnect of collaborative computing devices in a manner that supports ease of use.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-15(02) |
Blocking Inbound and Outbound Communications Traffic
|
— | — | ||||||||||||||||||||||||||||||
| SC-15(03) |
Disabling and Removal in Secure Work Areas
2 params
Disable or remove collaborative computing devices and applications from {{ insert: param, sc-15.03_odp.01 }} in {{ insert: param, sc-15.03_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-15(04) |
Explicitly Indicate Current Participants
1 param
Provide an explicit indication of current participants in {{ insert: param, sc-15.04_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-15a | Prohibit remote activation of collaborative computing devices and applications with the following exceptions: {{ insert: param, sc-15_odp }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-15b | Provide an explicit indication of use to users physically present at the devices. | — | — | ||||||||||||||||||||||||||||||
| SC-16 |
Transmission of Security and Privacy Attributes
3 params
Associate {{ insert: param, sc-16_prm_1 }} with information exchanged between systems and between system components.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-16(01) |
Integrity Verification
Verify the integrity of transmitted security and privacy attributes.
|
— | — | ||||||||||||||||||||||||||||||
| SC-16(02) |
Anti-spoofing Mechanisms
Implement anti-spoofing mechanisms to prevent adversaries from falsifying the security attributes indicating the successful application of the security process.
|
— | — | ||||||||||||||||||||||||||||||
| SC-16(03) |
Cryptographic Binding
1 param
Implement {{ insert: param, sc-16.03_odp }} to bind security and privacy attributes to transmitted information.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-17 |
Public Key Infrastructure Certificates
1 param
a. Issue public key certificates under an {{ insert: param, sc-17_odp }} or obtain public key certificates from an approved service provider; and
b. Include only approved trust anchors in trust...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-17a | Issue public key certificates under an {{ insert: param, sc-17_odp }} or obtain public key certificates from an approved service provider; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-17b | Include only approved trust anchors in trust stores or certificate stores managed by the organization. | — | — | ||||||||||||||||||||||||||||||
| SC-18 |
Mobile Code
a. Define acceptable and unacceptable mobile code and mobile code technologies; and
b. Authorize, monitor, and control the use of mobile code within the system.
|
— | — | ||||||||||||||||||||||||||||||
| SC-18(01) |
Identify Unacceptable Code and Take Corrective Actions
2 params
Identify {{ insert: param, sc-18.01_odp.01 }} and take {{ insert: param, sc-18.01_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-18(02) |
Acquisition, Development, and Use
1 param
Verify that the acquisition, development, and use of mobile code to be deployed in the system meets {{ insert: param, sc-18.02_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-18(03) |
Prevent Downloading and Execution
1 param
Prevent the download and execution of {{ insert: param, sc-18.03_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-18(04) |
Prevent Automatic Execution
2 params
Prevent the automatic execution of mobile code in {{ insert: param, sc-18.04_odp.01 }} and enforce {{ insert: param, sc-18.04_odp.02 }} prior to executing the code.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-18(05) |
Allow Execution Only in Confined Environments
Allow execution of permitted mobile code only in confined virtual machine environments.
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-18a | Define acceptable and unacceptable mobile code and mobile code technologies; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-18b | Authorize, monitor, and control the use of mobile code within the system. | — | — | ||||||||||||||||||||||||||||||
| SC-19 |
Voice Over Internet Protocol
Technology-specific; addressed as any other technology or protocol.
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-1a | Develop, document, and disseminate to {{ insert: param, sc-1_prm_1 }}: | — | — | ||||||||||||||||||||||||||||||
| └ sc-1a.1 | {{ insert: param, sc-01_odp.03 }} system and communications protection policy that: | — | — | ||||||||||||||||||||||||||||||
| └ sc-1a.1.(a) | Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-1a.1.(b) | Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-1a.2 | Procedures to facilitate the implementation of the system and communications protection policy and the associated system and communications protect... | — | — | ||||||||||||||||||||||||||||||
| └ sc-1b | Designate an {{ insert: param, sc-01_odp.04 }} to manage the development, documentation, and dissemination of the system and communications protect... | — | — | ||||||||||||||||||||||||||||||
| └ sc-1c | Review and update the current system and communications protection: | — | — | ||||||||||||||||||||||||||||||
| └ sc-1c.1 | Policy {{ insert: param, sc-01_odp.05 }} and following {{ insert: param, sc-01_odp.06 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-1c.2 | Procedures {{ insert: param, sc-01_odp.07 }} and following {{ insert: param, sc-01_odp.08 }}. | — | — | ||||||||||||||||||||||||||||||
| SC-20 |
Secure Name/Address Resolution Service (Authoritative Source)
a. Provide additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address res...
|
— | — | ||||||||||||||||||||||||||||||
| SC-20(01) |
Child Subspaces
|
— | — | ||||||||||||||||||||||||||||||
| SC-20(02) |
Data Origin and Integrity
Provide data origin and integrity protection artifacts for internal name/address resolution queries.
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-20a | Provide additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system ret... | — | — | ||||||||||||||||||||||||||||||
| └ sc-20b | Provide the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a... | — | — | ||||||||||||||||||||||||||||||
| SC-21 |
Secure Name/Address Resolution Service (Recursive or Caching Resolver)
Request and perform data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.
|
— | — | ||||||||||||||||||||||||||||||
| SC-21(01) |
Data Origin and Integrity
|
— | — | ||||||||||||||||||||||||||||||
| SC-22 |
Architecture and Provisioning for Name/Address Resolution Service
Ensure the systems that collectively provide name/address resolution service for an organization are fault-tolerant and implement internal and external role separation.
|
— | — | ||||||||||||||||||||||||||||||
| SC-23 |
Session Authenticity
Protect the authenticity of communications sessions.
|
— | — | ||||||||||||||||||||||||||||||
| SC-23(01) |
Invalidate Session Identifiers at Logout
Invalidate session identifiers upon user logout or other session termination.
|
— | — | ||||||||||||||||||||||||||||||
| SC-23(02) |
User-initiated Logouts and Message Displays
|
— | — | ||||||||||||||||||||||||||||||
| SC-23(03) |
Unique System-generated Session Identifiers
1 param
Generate a unique session identifier for each session with {{ insert: param, sc-23.03_odp }} and recognize only session identifiers that are system-generated.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-23(04) |
Unique Session Identifiers with Randomization
|
— | — | ||||||||||||||||||||||||||||||
| SC-23(05) |
Allowed Certificate Authorities
1 param
Only allow the use of {{ insert: param, sc-23.05_odp }} for verification of the establishment of protected sessions.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-24 |
Fail in Known State
3 params
Fail to a {{ insert: param, sc-24_odp.02 }} for the following failures on the indicated components while preserving {{ insert: param, sc-24_odp.03 }} in failure: {{ insert: param, sc-24_odp.01 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-25 |
Thin Nodes
1 param
Employ minimal functionality and information storage on the following system components: {{ insert: param, sc-25_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-26 |
Decoys
Include components within organizational systems specifically designed to be the target of malicious attacks for detecting, deflecting, and analyzing such attacks.
|
— | — | ||||||||||||||||||||||||||||||
| SC-26(01) |
Detection of Malicious Code
|
— | — | ||||||||||||||||||||||||||||||
| SC-27 |
Platform-independent Applications
1 param
Include within organizational systems the following platform independent applications: {{ insert: param, sc-27_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-28 |
Protection of Information at Rest
2 params
Protect the {{ insert: param, sc-28_odp.01 }} of the following information at rest: {{ insert: param, sc-28_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-28(01) |
Cryptographic Protection
2 params
Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of the following information at rest on {{ insert: param, sc-28.01_odp.02 }}: {{ insert: param, sc-28.01_odp.0...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-28(02) |
Offline Storage
1 param
Remove the following information from online storage and store offline in a secure location: {{ insert: param, sc-28.02_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-28(03) |
Cryptographic Keys
2 params
Provide protected storage for cryptographic keys {{ insert: param, sc-28.03_odp.01 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-29 |
Heterogeneity
1 param
Employ a diverse set of information technologies for the following system components in the implementation of the system: {{ insert: param, sc-29_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-29(01) |
Virtualization Techniques
1 param
Employ virtualization techniques to support the deployment of a diversity of operating systems and applications that are changed {{ insert: param, sc-29.01_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-30 |
Concealment and Misdirection
3 params
Employ the following concealment and misdirection techniques for {{ insert: param, sc-30_odp.02 }} at {{ insert: param, sc-30_odp.03 }} to confuse and mislead adversaries: {{ insert: param, sc-30_o...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-30(01) |
Virtualization Techniques
|
— | — | ||||||||||||||||||||||||||||||
| SC-30(02) |
Randomness
1 param
Employ {{ insert: param, sc-30.02_odp }} to introduce randomness into organizational operations and assets.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-30(03) |
Change Processing and Storage Locations
3 params
Change the location of {{ insert: param, sc-30.03_odp.01 }} {{ insert: param, sc-30.03_odp.02 }}].
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-30(04) |
Misleading Information
1 param
Employ realistic, but misleading information in {{ insert: param, sc-30.04_odp }} about its security state or posture.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-30(05) |
Concealment of System Components
2 params
Employ the following techniques to hide or conceal {{ insert: param, sc-30.05_odp.02 }}: {{ insert: param, sc-30.05_odp.01 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-31 |
Covert Channel Analysis
1 param
a. Perform a covert channel analysis to identify those aspects of communications within the system that are potential avenues for covert {{ insert: param, sc-31_odp }} channels; and
b. Estimate...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-31(01) |
Test Covert Channels for Exploitability
Test a subset of the identified covert channels to determine the channels that are exploitable.
|
— | — | ||||||||||||||||||||||||||||||
| SC-31(02) |
Maximum Bandwidth
2 params
Reduce the maximum bandwidth for identified covert {{ insert: param, sc-31.02_odp.01 }} channels to {{ insert: param, sc-31.02_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-31(03) |
Measure Bandwidth in Operational Environments
1 param
Measure the bandwidth of {{ insert: param, sc-31.03_odp }} in the operational environment of the system.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-31a | Perform a covert channel analysis to identify those aspects of communications within the system that are potential avenues for covert {{ insert: pa... | — | — | ||||||||||||||||||||||||||||||
| └ sc-31b | Estimate the maximum bandwidth of those channels. | — | — | ||||||||||||||||||||||||||||||
| SC-32 |
System Partitioning
3 params
Partition the system into {{ insert: param, sc-32_odp.01 }} residing in separate {{ insert: param, sc-32_odp.02 }} domains or environments based on {{ insert: param, sc-32_odp.03 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-32(01) |
Separate Physical Domains for Privileged Functions
Partition privileged functions into separate physical domains.
|
— | — | ||||||||||||||||||||||||||||||
| SC-33 |
Transmission Preparation Integrity
|
— | — | ||||||||||||||||||||||||||||||
| SC-34 |
Non-modifiable Executable Programs
2 params
For {{ insert: param, sc-34_odp.01 }} , load and execute:
a. The operating environment from hardware-enforced, read-only media; and
b. The following applications from hardware-enforced, read-on...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-34(01) |
No Writable Storage
1 param
Employ {{ insert: param, sc-34.01_odp }} with no writeable storage that is persistent across component restart or power on/off.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-34(02) |
Integrity Protection on Read-only Media
Protect the integrity of information prior to storage on read-only media and control the media after such information has been recorded onto the media.
|
— | — | ||||||||||||||||||||||||||||||
| SC-34(03) |
Hardware-based Protection
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-34a | The operating environment from hardware-enforced, read-only media; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-34b | The following applications from hardware-enforced, read-only media: {{ insert: param, sc-34_odp.02 }}. | — | — | ||||||||||||||||||||||||||||||
| SC-35 |
External Malicious Code Identification
Include system components that proactively seek to identify network-based malicious code or malicious websites.
|
— | — | ||||||||||||||||||||||||||||||
| SC-36 |
Distributed Processing and Storage
6 params
Distribute the following processing and storage components across multiple {{ insert: param, sc-36_prm_1 }}: {{ insert: param, sc-36_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-36(01) |
Polling Techniques
2 params
(a) Employ polling techniques to identify potential faults, errors, or compromises to the following processing and storage components: {{ insert: param, sc-36.01_odp.01 }} ; and
(b) Take the fo...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-36(02) |
Synchronization
1 param
Synchronize the following duplicate systems or system components: {{ insert: param, sc-36.02_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-36.1.(a) | Employ polling techniques to identify potential faults, errors, or compromises to the following processing and storage components: {{ insert: param... | — | — | ||||||||||||||||||||||||||||||
| └ sc-36.1.(b) | Take the following actions in response to identified faults, errors, or compromises: {{ insert: param, sc-36.01_odp.02 }}. | — | — | ||||||||||||||||||||||||||||||
| SC-37 |
Out-of-band Channels
3 params
Employ the following out-of-band channels for the physical delivery or electronic transmission of {{ insert: param, sc-37_odp.02 }} to {{ insert: param, sc-37_odp.03 }}: {{ insert: param, sc-37_odp...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-37(01) |
Ensure Delivery and Transmission
3 params
Employ {{ insert: param, sc-37.01_odp.01 }} to ensure that only {{ insert: param, sc-37.01_odp.02 }} receive the following information, system components, or devices: {{ insert: param, sc-37.01_odp...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-38 |
Operations Security
1 param
Employ the following operations security controls to protect key organizational information throughout the system development life cycle: {{ insert: param, sc-38_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-39 |
Process Isolation
Maintain a separate execution domain for each executing system process.
|
— | — | ||||||||||||||||||||||||||||||
| SC-39(01) |
Hardware Separation
Implement hardware separation mechanisms to facilitate process isolation.
|
— | — | ||||||||||||||||||||||||||||||
| SC-39(02) |
Separate Execution Domain Per Thread
1 param
Maintain a separate execution domain for each thread in {{ insert: param, sc-39.02_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-40 |
Wireless Link Protection
6 params
Protect external and internal {{ insert: param, sc-40_prm_1 }} from the following signal parameter attacks: {{ insert: param, sc-40_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-40(01) |
Electromagnetic Interference
1 param
Implement cryptographic mechanisms that achieve {{ insert: param, sc-40.01_odp }} against the effects of intentional electromagnetic interference.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-40(02) |
Reduce Detection Potential
1 param
Implement cryptographic mechanisms to reduce the detection potential of wireless links to {{ insert: param, sc-40.02_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-40(03) |
Imitative or Manipulative Communications Deception
Implement cryptographic mechanisms to identify and reject wireless transmissions that are deliberate attempts to achieve imitative or manipulative communications deception based on signal parameters.
|
— | — | ||||||||||||||||||||||||||||||
| SC-40(04) |
Signal Parameter Identification
1 param
Implement cryptographic mechanisms to prevent the identification of {{ insert: param, sc-40.04_odp }} by using the transmitter signal parameters.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-41 |
Port and I/O Device Access
3 params
{{ insert: param, sc-41_odp.02 }} disable or remove {{ insert: param, sc-41_odp.01 }} on the following systems or system components: {{ insert: param, sc-41_odp.03 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-42 |
Sensor Capability and Data
5 params
a. Prohibit {{ insert: param, sc-42_odp.01 }} ; and
b. Provide an explicit indication of sensor use to {{ insert: param, sc-42_odp.05 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-42(01) |
Reporting to Authorized Individuals or Roles
1 param
Verify that the system is configured so that data or information collected by the {{ insert: param, sc-42.01_odp }} is only reported to authorized individuals or roles.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-42(02) |
Authorized Use
1 param
Employ the following measures so that data or information collected by {{ insert: param, sc-42.01_odp }} is only used for authorized purposes: {{ insert: param, sc-42.02_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-42(03) |
Prohibit Use of Devices
|
— | — | ||||||||||||||||||||||||||||||
| SC-42(04) |
Notice of Collection
2 params
Employ the following measures to facilitate an individual’s awareness that personally identifiable information is being collected by {{ insert: param, sc-42.04_odp.02 }}: {{ insert: param, sc-42.04...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-42(05) |
Collection Minimization
1 param
Employ {{ insert: param, sc-42.05_odp }} that are configured to minimize the collection of information about individuals that is not needed.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-42a | Prohibit {{ insert: param, sc-42_odp.01 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-42b | Provide an explicit indication of sensor use to {{ insert: param, sc-42_odp.05 }}. | — | — | ||||||||||||||||||||||||||||||
| SC-43 |
Usage Restrictions
1 param
a. Establish usage restrictions and implementation guidelines for the following system components: {{ insert: param, sc-43_odp }} ; and
b. Authorize, monitor, and control the use of such compon...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-43a | Establish usage restrictions and implementation guidelines for the following system components: {{ insert: param, sc-43_odp }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-43b | Authorize, monitor, and control the use of such components within the system. | — | — | ||||||||||||||||||||||||||||||
| SC-44 |
Detonation Chambers
1 param
Employ a detonation chamber capability within {{ insert: param, sc-44_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-45 |
System Time Synchronization
Synchronize system clocks within and between systems and system components.
|
— | — | ||||||||||||||||||||||||||||||
| SC-45(01) |
Synchronization with Authoritative Time Source
3 params
(a) Compare the internal system clocks {{ insert: param, sc-45.01_odp.01 }} with {{ insert: param, sc-45.01_odp.02 }} ; and
(b) Synchronize the internal system clocks to the authoritative time ...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-45(02) |
Secondary Authoritative Time Source
(a) Identify a secondary authoritative time source that is in a different geographic region than the primary authoritative time source; and
(b) Synchronize the internal system clocks to the sec...
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-45.1.(a) | Compare the internal system clocks {{ insert: param, sc-45.01_odp.01 }} with {{ insert: param, sc-45.01_odp.02 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-45.1.(b) | Synchronize the internal system clocks to the authoritative time source when the time difference is greater than {{ insert: param, sc-45.01_odp.03 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sc-45.2.(a) | Identify a secondary authoritative time source that is in a different geographic region than the primary authoritative time source; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-45.2.(b) | Synchronize the internal system clocks to the secondary authoritative time source if the primary authoritative time source is unavailable. | — | — | ||||||||||||||||||||||||||||||
| SC-46 |
Cross Domain Policy Enforcement
1 param
Implement a policy enforcement mechanism {{ insert: param, sc-46_odp }} between the physical and/or network interfaces for the connecting security domains.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-47 |
Alternate Communications Paths
1 param
Establish {{ insert: param, sc-47_odp }} for system operations organizational command and control.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-48 |
Sensor Relocation
3 params
Relocate {{ insert: param, sc-48_odp.01 }} to {{ insert: param, sc-48_odp.02 }} under the following conditions or circumstances: {{ insert: param, sc-48_odp.03 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-48(01) |
Dynamic Relocation of Sensors or Monitoring Capabilities
3 params
Dynamically relocate {{ insert: param, sc-48.01_odp.01 }} to {{ insert: param, sc-48.01_odp.02 }} under the following conditions or circumstances: {{ insert: param, sc-48.01_odp.03 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-49 |
Hardware-enforced Separation and Policy Enforcement
1 param
Implement hardware-enforced separation and policy enforcement mechanisms between {{ insert: param, sc-49_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-50 |
Software-enforced Separation and Policy Enforcement
1 param
Implement software-enforced separation and policy enforcement mechanisms between {{ insert: param, sc-50_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SC-51 |
Hardware-based Protection
2 params
a. Employ hardware-based, write-protect for {{ insert: param, sc-51_odp.01 }} ; and
b. Implement specific procedures for {{ insert: param, sc-51_odp.02 }} to manually disable hardware write-pro...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ sc-51a | Employ hardware-based, write-protect for {{ insert: param, sc-51_odp.01 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-51b | Implement specific procedures for {{ insert: param, sc-51_odp.02 }} to manually disable hardware write-protect for firmware modifications and re-en... | — | — | ||||||||||||||||||||||||||||||
| └ sc-5.3.(a) | Employ the following monitoring tools to detect indicators of denial-of-service attacks against, or launched from, the system: {{ insert: param, sc... | — | — | ||||||||||||||||||||||||||||||
| └ sc-5.3.(b) | Monitor the following system resources to determine if sufficient resources exist to prevent effective denial-of-service attacks: {{ insert: param,... | — | — | ||||||||||||||||||||||||||||||
| └ sc-5a | {{ insert: param, sc-05_odp.02 }} the effects of the following types of denial-of-service events: {{ insert: param, sc-05_odp.01 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-5b | Employ the following controls to achieve the denial-of-service objective: {{ insert: param, sc-05_odp.03 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.10.(a) | Prevent the exfiltration of information; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.10.(b) | Conduct exfiltration tests {{ insert: param, sc-07.10_odp }}. | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.24.(a) | Apply the following processing rules to data elements of personally identifiable information: {{ insert: param, sc-07.24_odp }}; | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.24.(b) | Monitor for permitted processing at the external interfaces to the system and at key internal boundaries within the system; | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.24.(c) | Document each processing exception; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.24.(d) | Review and remove exceptions that are no longer supported. | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.4.(a) | Implement a managed interface for each external telecommunication service; | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.4.(b) | Establish a traffic flow policy for each managed interface; | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.4.(c) | Protect the confidentiality and integrity of the information being transmitted across each interface; | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.4.(d) | Document each exception to the traffic flow policy with a supporting mission or business need and duration of that need; | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.4.(e) | Review exceptions to the traffic flow policy {{ insert: param, sc-07.04_odp }} and remove exceptions that are no longer supported by an explicit mi... | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.4.(f) | Prevent unauthorized exchange of control plane traffic with external networks; | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.4.(g) | Publish information to enable remote networks to detect unauthorized control plane traffic from internal networks; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.4.(h) | Filter unauthorized control plane traffic from external networks. | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.9.(a) | Detect and deny outgoing communications traffic posing a threat to external systems; and | — | — | ||||||||||||||||||||||||||||||
| └ sc-7.9.(b) | Audit the identity of internal users associated with denied communications. | — | — | ||||||||||||||||||||||||||||||
| └ sc-7a | Monitor and control communications at the external managed interfaces to the system and at key internal managed interfaces within the system; | — | — | ||||||||||||||||||||||||||||||
| └ sc-7b | Implement subnetworks for publicly accessible system components that are {{ insert: param, sc-07_odp }} separated from internal organizational netw... | — | — | ||||||||||||||||||||||||||||||
| └ sc-7c | Connect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an or... | — | — |