💼 SC-1 Policy and Procedures (L)(M)(H) | | | | |
💼 SC-5 Denial-of-service Protection (L)(M)(H) | | | | |
💼 SC-7 Boundary Protection (L)(M)(H) | | | 33 | |
💼 SC-8 Transmission Confidentiality and Integrity (L)(M)(H) | 1 | | 15 | |
    💼 SC-8(1) Cryptographic Protection (L)(M)(H) | | | 16 | |
💼 SC-12 Cryptographic Key Establishment and Management (L)(M)(H) | | | 11 | |
💼 SC-13 Cryptographic Protection (L)(M)(H) | | | 24 | |
💼 SC-15 Collaborative Computing Devices and Applications (L)(M)(H) | | | | |
💼 SC-20 Secure Name/Address Resolution Service (Authoritative Source) (L)(M)(H) | | | | |
💼 SC-21 Secure Name/Address Resolution Service (Recursive or Caching Resolver) (L)(M)(H) | | | | |
💼 SC-22 Architecture and Provisioning for Name/Address Resolution Service (L)(M)(H) | | | | |
💼 SC-28 Protection of Information at Rest (L)(M)(H) | 1 | | 22 | |
    💼 SC-28(1) Cryptographic Protection (L)(M)(H) | | | 14 | |
💼 SC-39 Process Isolation (L)(M)(H) | | | | |