๐ผ SC-1 Policy and Procedures (L)(M)(H) | | | | |
๐ผ SC-2 Separation of System and User Functionality (M)(H) | | | | |
๐ผ SC-3 Security Function Isolation (H) | | | | |
๐ผ SC-4 Information in Shared System Resources (M)(H) | | | | |
๐ผ SC-5 Denial-of-service Protection (L)(M)(H) | | | | |
๐ผ SC-7 Boundary Protection (L)(M)(H) | 10 | 6 | 23 | |
ย ย ย ย ๐ผ SC-7(3) Access Points (M)(H) | | | 2 | |
ย ย ย ย ๐ผ SC-7(4) External Telecommunications Services (M)(H) | | | 17 | |
ย ย ย ย ๐ผ SC-7(5) Deny by Default โ Allow by Exception (M)(H) | | | 19 | |
ย ย ย ย ๐ผ SC-7(7) Split Tunneling for Remote Devices (M)(H) | | | | |
ย ย ย ย ๐ผ SC-7(8) Route Traffic to Authenticated Proxy Servers (M)(H) | | | | |
ย ย ย ย ๐ผ SC-7(10) Prevent Exfiltration (H) | | | 4 | |
ย ย ย ย ๐ผ SC-7(12) Host-based Protection (M)(H) | | | | |
ย ย ย ย ๐ผ SC-7(18) Fail Secure (M)(H) | | | | |
ย ย ย ย ๐ผ SC-7(20) Dynamic Isolation and Segregation (H) | | | 2 | |
ย ย ย ย ๐ผ SC-7(21) Isolation of System Components (H) | | | 16 | |
๐ผ SC-8 Transmission Confidentiality and Integrity (L)(M)(H) | 1 | 6 | 8 | |
ย ย ย ย ๐ผ SC-8(1) Cryptographic Protection (L)(M)(H) | | 6 | 10 | |
๐ผ SC-10 Network Disconnect (M)(H) | | | | |
๐ผ SC-12 Cryptographic Key Establishment and Management (L)(M)(H) | 1 | 9 | 11 | |
ย ย ย ย ๐ผ SC-12(1) Availability (H) | | | | |
๐ผ SC-13 Cryptographic Protection (L)(M)(H) | | 13 | 16 | |
๐ผ SC-15 Collaborative Computing Devices and Applications (L)(M)(H) | | | | |
๐ผ SC-17 Public Key Infrastructure Certificates (M)(H) | | 1 | 1 | |
๐ผ SC-18 Mobile Code (M)(H) | | | | |
๐ผ SC-20 Secure Name/Address Resolution Service (Authoritative Source) (L)(M)(H) | | | | |
๐ผ SC-21 Secure Name/Address Resolution Service (Recursive or Caching Resolver) (L)(M)(H) | | | | |
๐ผ SC-22 Architecture and Provisioning for Name/Address Resolution Service (L)(M)(H) | | | | |
๐ผ SC-23 Session Authenticity (M)(H) | | 5 | 7 | |
๐ผ SC-24 Fail in Known State (H) | | | | |
๐ผ SC-28 Protection of Information at Rest (L)(M)(H) | 1 | 7 | 15 | |
ย ย ย ย ๐ผ SC-28(1) Cryptographic Protection (L)(M)(H) | | 5 | 12 | |
๐ผ SC-39 Process Isolation (L)(M)(H) | | | | |
๐ผ SC-45 System Time Synchronization (M)(H) | 1 | | | |
ย ย ย ย ๐ผ SC-45(1) Synchronization with Authoritative Time Source (M)(H) | | | | |