Skip to main content

๐Ÿ’ผ System and Communications Protection

  • Contextual name: ๐Ÿ’ผ System and Communications Protection
  • ID: /frameworks/fedramp-high-security-controls/sc
  • Located in: ๐Ÿ’ผ FedRAMP High Security Controls

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-334efd86

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ SC-1 Policy and Procedures (L)(M)(H)
๐Ÿ’ผ SC-2 Separation of System and User Functionality (M)(H)
๐Ÿ’ผ SC-3 Security Function Isolation (H)
๐Ÿ’ผ SC-4 Information in Shared System Resources (M)(H)
๐Ÿ’ผ SC-5 Denial-of-service Protection (L)(M)(H)
๐Ÿ’ผ SC-7 Boundary Protection (L)(M)(H)10623
ย ย ย ย ๐Ÿ’ผ SC-7(3) Access Points (M)(H)2
ย ย ย ย ๐Ÿ’ผ SC-7(4) External Telecommunications Services (M)(H)17
ย ย ย ย ๐Ÿ’ผ SC-7(5) Deny by Default โ€” Allow by Exception (M)(H)19
ย ย ย ย ๐Ÿ’ผ SC-7(7) Split Tunneling for Remote Devices (M)(H)
ย ย ย ย ๐Ÿ’ผ SC-7(8) Route Traffic to Authenticated Proxy Servers (M)(H)
ย ย ย ย ๐Ÿ’ผ SC-7(10) Prevent Exfiltration (H)4
ย ย ย ย ๐Ÿ’ผ SC-7(12) Host-based Protection (M)(H)
ย ย ย ย ๐Ÿ’ผ SC-7(18) Fail Secure (M)(H)
ย ย ย ย ๐Ÿ’ผ SC-7(20) Dynamic Isolation and Segregation (H)2
ย ย ย ย ๐Ÿ’ผ SC-7(21) Isolation of System Components (H)16
๐Ÿ’ผ SC-8 Transmission Confidentiality and Integrity (L)(M)(H)168
ย ย ย ย ๐Ÿ’ผ SC-8(1) Cryptographic Protection (L)(M)(H)610
๐Ÿ’ผ SC-10 Network Disconnect (M)(H)
๐Ÿ’ผ SC-12 Cryptographic Key Establishment and Management (L)(M)(H)1911
ย ย ย ย ๐Ÿ’ผ SC-12(1) Availability (H)
๐Ÿ’ผ SC-13 Cryptographic Protection (L)(M)(H)1316
๐Ÿ’ผ SC-15 Collaborative Computing Devices and Applications (L)(M)(H)
๐Ÿ’ผ SC-17 Public Key Infrastructure Certificates (M)(H)11
๐Ÿ’ผ SC-18 Mobile Code (M)(H)
๐Ÿ’ผ SC-20 Secure Name/Address Resolution Service (Authoritative Source) (L)(M)(H)
๐Ÿ’ผ SC-21 Secure Name/Address Resolution Service (Recursive or Caching Resolver) (L)(M)(H)
๐Ÿ’ผ SC-22 Architecture and Provisioning for Name/Address Resolution Service (L)(M)(H)
๐Ÿ’ผ SC-23 Session Authenticity (M)(H)57
๐Ÿ’ผ SC-24 Fail in Known State (H)
๐Ÿ’ผ SC-28 Protection of Information at Rest (L)(M)(H)1715
ย ย ย ย ๐Ÿ’ผ SC-28(1) Cryptographic Protection (L)(M)(H)512
๐Ÿ’ผ SC-39 Process Isolation (L)(M)(H)
๐Ÿ’ผ SC-45 System Time Synchronization (M)(H)1
ย ย ย ย ๐Ÿ’ผ SC-45(1) Synchronization with Authoritative Time Source (M)(H)