Skip to main content

💼 System and Communications Protection

  • ID: /frameworks/fedramp-moderate-security-controls/sc

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-334efd86

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 SC-1 Policy and Procedures (L)(M)(H)no data
💼 SC-2 Separation of System and User Functionality (M)(H)no data
💼 SC-4 Information in Shared System Resources (M)(H)no data
💼 SC-5 Denial-of-service Protection (L)(M)(H)1no data
💼 SC-7 Boundary Protection (L)(M)(H)742no data
 💼 SC-7(3) Access Points (M)(H)8no data
 💼 SC-7(4) External Telecommunications Services (M)(H)28no data
 💼 SC-7(5) Deny by Default — Allow by Exception (M)(H)18no data
 💼 SC-7(7) Split Tunneling for Remote Devices (M)(H)no data
 💼 SC-7(8) Route Traffic to Authenticated Proxy Servers (M)(H)no data
 💼 SC-7(12) Host-based Protection (M)(H)no data
 💼 SC-7(18) Fail Secure (M)(H)no data
💼 SC-8 Transmission Confidentiality and Integrity (L)(M)(H)117no data
 💼 SC-8(1) Cryptographic Protection (L)(M)(H)16no data
💼 SC-10 Network Disconnect (M)(H)no data
💼 SC-12 Cryptographic Key Establishment and Management (L)(M)(H)11no data
💼 SC-13 Cryptographic Protection (L)(M)(H)24no data
💼 SC-15 Collaborative Computing Devices and Applications (L)(M)(H)no data
💼 SC-17 Public Key Infrastructure Certificates (M)(H)2no data
💼 SC-18 Mobile Code (M)(H)no data
💼 SC-20 Secure Name/Address Resolution Service (Authoritative Source) (L)(M)(H)no data
💼 SC-21 Secure Name/Address Resolution Service (Recursive or Caching Resolver) (L)(M)(H)no data
💼 SC-22 Architecture and Provisioning for Name/Address Resolution Service (L)(M)(H)no data
💼 SC-23 Session Authenticity (M)(H)13no data
💼 SC-28 Protection of Information at Rest (L)(M)(H)124no data
 💼 SC-28(1) Cryptographic Protection (L)(M)(H)14no data
💼 SC-39 Process Isolation (L)(M)(H)no data
💼 SC-45 System Time Synchronization (M)(H)1no data
 💼 SC-45(1) Synchronization with Authoritative Time Source (M)(H)no data