Skip to main content

💼 SC SYSTEM AND COMMUNICATIONS PROTECTION

  • ID: /frameworks/nist-sp-800-53-r4/sc

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-909b5fe9

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 SC-1 SYSTEM AND COMMUNICATIONS PROTECTION POLICY AND PROCEDURESno data
💼 SC-2 APPLICATION PARTITIONING1no data
 💼 SC-2 (1) INTERFACES FOR NON-PRIVILEGED USERSno data
💼 SC-3 SECURITY FUNCTION ISOLATION5no data
 💼 SC-3 (1) HARDWARE SEPARATIONno data
 💼 SC-3 (2) ACCESS _ FLOW CONTROL FUNCTIONSno data
 💼 SC-3 (3) MINIMIZE NONSECURITY FUNCTIONALITYno data
 💼 SC-3 (4) MODULE COUPLING AND COHESIVENESSno data
 💼 SC-3 (5) LAYERED STRUCTURESno data
💼 SC-4 INFORMATION IN SHARED RESOURCES2no data
 💼 SC-4 (1) SECURITY LEVELSno data
 💼 SC-4 (2) PERIODS PROCESSINGno data
💼 SC-5 DENIAL OF SERVICE PROTECTION3no data
 💼 SC-5 (1) RESTRICT INTERNAL USERSno data
 💼 SC-5 (2) EXCESS CAPACITY _ BANDWIDTH _ REDUNDANCYno data
 💼 SC-5 (3) DETECTION _ MONITORINGno data
💼 SC-6 RESOURCE AVAILABILITYno data
💼 SC-7 BOUNDARY PROTECTION23531no data
 💼 SC-7 (1) PHYSICALLY SEPARATED SUBNETWORKSno data
 💼 SC-7 (2) PUBLIC ACCESSno data
 💼 SC-7 (3) ACCESS POINTSno data
 💼 SC-7 (4) EXTERNAL TELECOMMUNICATIONS SERVICESno data
 💼 SC-7 (5) DENY BY DEFAULT _ ALLOW BY EXCEPTIONno data
 💼 SC-7 (6) RESPONSE TO RECOGNIZED FAILURESno data
 💼 SC-7 (7) PREVENT SPLIT TUNNELING FOR REMOTE DEVICESno data
 💼 SC-7 (8) ROUTE TRAFFIC TO AUTHENTICATED PROXY SERVERSno data
 💼 SC-7 (9) RESTRICT THREATENING OUTGOING COMMUNICATIONS TRAFFICno data
 💼 SC-7 (10) PREVENT UNAUTHORIZED EXFILTRATIONno data
 💼 SC-7 (11) RESTRICT INCOMING COMMUNICATIONS TRAFFICno data
 💼 SC-7 (12) HOST-BASED PROTECTIONno data
 💼 SC-7 (13) ISOLATION OF SECURITY TOOLS _ MECHANISMS _ SUPPORT COMPONENTSno data
 💼 SC-7 (14) PROTECTS AGAINST UNAUTHORIZED PHYSICAL CONNECTIONSno data
 💼 SC-7 (15) ROUTE PRIVILEGED NETWORK ACCESSESno data
 💼 SC-7 (16) PREVENT DISCOVERY OF COMPONENTS _ DEVICESno data
 💼 SC-7 (17) AUTOMATED ENFORCEMENT OF PROTOCOL FORMATSno data
 💼 SC-7 (18) FAIL SECUREno data
 💼 SC-7 (19) BLOCKS COMMUNICATION FROM NON-ORGANIZATIONALLY CONFIGURED HOSTSno data
 💼 SC-7 (20) DYNAMIC ISOLATION _ SEGREGATIONno data
 💼 SC-7 (21) ISOLATION OF INFORMATION SYSTEM COMPONENTSno data
 💼 SC-7 (22) SEPARATE SUBNETS FOR CONNECTING TO DIFFERENT SECURITY DOMAINSno data
 💼 SC-7 (23) DISABLE SENDER FEEDBACK ON PROTOCOL VALIDATION FAILUREno data
💼 SC-8 TRANSMISSION CONFIDENTIALITY AND INTEGRITY422no data
 💼 SC-8 (1) CRYPTOGRAPHIC OR ALTERNATE PHYSICAL PROTECTIONno data
 💼 SC-8 (2) PRE _ POST TRANSMISSION HANDLINGno data
 💼 SC-8 (3) CRYPTOGRAPHIC PROTECTION FOR MESSAGE EXTERNALSno data
 💼 SC-8 (4) CONCEAL _ RANDOMIZE COMMUNICATIONSno data
💼 SC-9 TRANSMISSION CONFIDENTIALITYno data
💼 SC-10 NETWORK DISCONNECTno data
💼 SC-11 TRUSTED PATH1no data
 💼 SC-11 (1) LOGICAL ISOLATIONno data
💼 SC-12 CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT545no data
 💼 SC-12 (1) AVAILABILITYno data
 💼 SC-12 (2) SYMMETRIC KEYS11no data
 💼 SC-12 (3) ASYMMETRIC KEYS11no data
 💼 SC-12 (4) PKI CERTIFICATESno data
 💼 SC-12 (5) PKI CERTIFICATES _ HARDWARE TOKENSno data
💼 SC-13 CRYPTOGRAPHIC PROTECTION422no data
 💼 SC-13 (1) FIPS-VALIDATED CRYPTOGRAPHYno data
 💼 SC-13 (2) NSA-APPROVED CRYPTOGRAPHYno data
 💼 SC-13 (3) INDIVIDUALS WITHOUT FORMAL ACCESS APPROVALSno data
 💼 SC-13 (4) DIGITAL SIGNATURESno data
💼 SC-14 PUBLIC ACCESS PROTECTIONSno data
💼 SC-15 COLLABORATIVE COMPUTING DEVICES4no data
 💼 SC-15 (1) PHYSICAL DISCONNECTno data
 💼 SC-15 (2) BLOCKING INBOUND _ OUTBOUND COMMUNICATIONS TRAFFICno data
 💼 SC-15 (3) DISABLING _ REMOVAL IN SECURE WORK AREASno data
 💼 SC-15 (4) EXPLICITLY INDICATE CURRENT PARTICIPANTSno data
💼 SC-16 TRANSMISSION OF SECURITY ATTRIBUTES1no data
 💼 SC-16 (1) INTEGRITY VALIDATIONno data
💼 SC-17 PUBLIC KEY INFRASTRUCTURE CERTIFICATES22no data
💼 SC-18 MOBILE CODE5no data
 💼 SC-18 (1) IDENTIFY UNACCEPTABLE CODE _ TAKE CORRECTIVE ACTIONSno data
 💼 SC-18 (2) ACQUISITION _ DEVELOPMENT _ USEno data
 💼 SC-18 (3) PREVENT DOWNLOADING _ EXECUTIONno data
 💼 SC-18 (4) PREVENT AUTOMATIC EXECUTIONno data
 💼 SC-18 (5) ALLOW EXECUTION ONLY IN CONFINED ENVIRONMENTSno data
💼 SC-19 VOICE OVER INTERNET PROTOCOLno data
💼 SC-20 SECURE NAME _ ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE)2no data
 💼 SC-20 (1) CHILD SUBSPACESno data
 💼 SC-20 (2) DATA ORIGIN _ INTEGRITYno data
💼 SC-21 SECURE NAME _ ADDRESS RESOLUTION SERVICE (RECURSIVE OR CACHING RESOLVER)1no data
 💼 SC-21 (1) DATA ORIGIN _ INTEGRITYno data
💼 SC-22 ARCHITECTURE AND PROVISIONING FOR NAME _ ADDRESS RESOLUTION SERVICEno data
💼 SC-23 SESSION AUTHENTICITY4no data
 💼 SC-23 (1) INVALIDATE SESSION IDENTIFIERS AT LOGOUTno data
 💼 SC-23 (2) USER-INITIATED LOGOUTS _ MESSAGE DISPLAYSno data
 💼 SC-23 (4) UNIQUE SESSION IDENTIFIERS WITH RANDOMIZATIONno data
 💼 SC-23 (5) ALLOWED CERTIFICATE AUTHORITIESno data
💼 SC-24 FAIL IN KNOWN STATEno data
💼 SC-25 THIN NODESno data
💼 SC-26 HONEYPOTS1no data
 💼 SC-26 (1) DETECTION OF MALICIOUS CODEno data
💼 SC-27 PLATFORM-INDEPENDENT APPLICATIONSno data
💼 SC-28 PROTECTION OF INFORMATION AT REST233no data
 💼 SC-28 (1) CRYPTOGRAPHIC PROTECTIONno data
 💼 SC-28 (2) OFF-LINE STORAGEno data
💼 SC-29 HETEROGENEITY1no data
 💼 SC-29 (1) VIRTUALIZATION TECHNIQUESno data
💼 SC-30 CONCEALMENT AND MISDIRECTION5no data
 💼 SC-30 (1) VIRTUALIZATION TECHNIQUESno data
 💼 SC-30 (2) RANDOMNESSno data
 💼 SC-30 (3) CHANGE PROCESSING _ STORAGE LOCATIONSno data
 💼 SC-30 (4) MISLEADING INFORMATIONno data
 💼 SC-30 (5) CONCEALMENT OF SYSTEM COMPONENTSno data
💼 SC-31 COVERT CHANNEL ANALYSIS3no data
 💼 SC-31 (1) TEST COVERT CHANNELS FOR EXPLOITABILITYno data
 💼 SC-31 (2) MAXIMUM BANDWIDTHno data
 💼 SC-31 (3) MEASURE BANDWIDTH IN OPERATIONAL ENVIRONMENTSno data
💼 SC-32 INFORMATION SYSTEM PARTITIONINGno data
💼 SC-33 TRANSMISSION PREPARATION INTEGRITYno data
💼 SC-34 NON-MODIFIABLE EXECUTABLE PROGRAMS3no data
 💼 SC-34 (1) NO WRITABLE STORAGEno data
 💼 SC-34 (2) INTEGRITY PROTECTION _ READ-ONLY MEDIAno data
 💼 SC-34 (3) HARDWARE-BASED PROTECTIONno data
💼 SC-35 HONEYCLIENTSno data
💼 SC-36 DISTRIBUTED PROCESSING AND STORAGE1no data
 💼 SC-36 (1) POLLING TECHNIQUESno data
💼 SC-37 OUT-OF-BAND CHANNELS1no data
 💼 SC-37 (1) ENSURE DELIVERY _ TRANSMISSIONno data
💼 SC-38 OPERATIONS SECURITYno data
💼 SC-39 PROCESS ISOLATION2no data
 💼 SC-39 (1) HARDWARE SEPARATIONno data
 💼 SC-39 (2) THREAD ISOLATIONno data
💼 SC-40 WIRELESS LINK PROTECTION4no data
 💼 SC-40 (1) ELECTROMAGNETIC INTERFERENCEno data
 💼 SC-40 (2) REDUCE DETECTION POTENTIALno data
 💼 SC-40 (3) IMITATIVE OR MANIPULATIVE COMMUNICATIONS DECEPTIONno data
 💼 SC-40 (4) SIGNAL PARAMETER IDENTIFICATIONno data
💼 SC-41 PORT AND I_O DEVICE ACCESSno data
💼 SC-42 SENSOR CAPABILITY AND DATA3no data
 💼 SC-42 (1) REPORTING TO AUTHORIZED INDIVIDUALS OR ROLESno data
 💼 SC-42 (2) AUTHORIZED USEno data
 💼 SC-42 (3) PROHIBIT USE OF DEVICESno data
💼 SC-43 USAGE RESTRICTIONSno data
💼 SC-44 DETONATION CHAMBERSno data