๐ผ SC-1 Policy and Procedures (L)(M)(H) | | | | |
๐ผ SC-5 Denial-of-service Protection (L)(M)(H) | | | | |
๐ผ SC-7 Boundary Protection (L)(M)(H) | | | 23 | |
๐ผ SC-8 Transmission Confidentiality and Integrity (L)(M)(H) | 1 | | 8 | |
ย ย ย ย ๐ผ SC-8(1) Cryptographic Protection (L)(M)(H) | | | 10 | |
๐ผ SC-12 Cryptographic Key Establishment and Management (L)(M)(H) | | | 11 | |
๐ผ SC-13 Cryptographic Protection (L)(M)(H) | | | 16 | |
๐ผ SC-15 Collaborative Computing Devices and Applications (L)(M)(H) | | | | |
๐ผ SC-20 Secure Name/Address Resolution Service (Authoritative Source) (L)(M)(H) | | | | |
๐ผ SC-21 Secure Name/Address Resolution Service (Recursive or Caching Resolver) (L)(M)(H) | | | | |
๐ผ SC-22 Architecture and Provisioning for Name/Address Resolution Service (L)(M)(H) | | | | |
๐ผ SC-28 Protection of Information at Rest (L)(M)(H) | 1 | | 15 | |
ย ย ย ย ๐ผ SC-28(1) Cryptographic Protection (L)(M)(H) | | | 12 | |
๐ผ SC-39 Process Isolation (L)(M)(H) | | | | |