Skip to main content

💼 SC SYSTEM AND COMMUNICATIONS PROTECTION

  • Contextual name: 💼 SC SYSTEM AND COMMUNICATIONS PROTECTION
  • ID: /frameworks/nist-sp-800-53-r4/sc
  • Located in: 💼 NIST SP 800-53 Revision 4

Description

Empty...

Similar

  • Internal
    • ID: dec-b-909b5fe9

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags
💼 SC-1 SYSTEM AND COMMUNICATIONS PROTECTION POLICY AND PROCEDURES
💼 SC-2 APPLICATION PARTITIONING1
    💼 SC-2 (1) INTERFACES FOR NON-PRIVILEGED USERS
💼 SC-3 SECURITY FUNCTION ISOLATION5
    💼 SC-3 (1) HARDWARE SEPARATION
    💼 SC-3 (2) ACCESS _ FLOW CONTROL FUNCTIONS
    💼 SC-3 (3) MINIMIZE NONSECURITY FUNCTIONALITY
    💼 SC-3 (4) MODULE COUPLING AND COHESIVENESS
    💼 SC-3 (5) LAYERED STRUCTURES
💼 SC-4 INFORMATION IN SHARED RESOURCES2
    💼 SC-4 (1) SECURITY LEVELS
    💼 SC-4 (2) PERIODS PROCESSING
💼 SC-5 DENIAL OF SERVICE PROTECTION3
    💼 SC-5 (1) RESTRICT INTERNAL USERS
    💼 SC-5 (2) EXCESS CAPACITY _ BANDWIDTH _ REDUNDANCY
    💼 SC-5 (3) DETECTION _ MONITORING
💼 SC-6 RESOURCE AVAILABILITY
💼 SC-7 BOUNDARY PROTECTION2356
    💼 SC-7 (1) PHYSICALLY SEPARATED SUBNETWORKS
    💼 SC-7 (2) PUBLIC ACCESS
    💼 SC-7 (3) ACCESS POINTS
    💼 SC-7 (4) EXTERNAL TELECOMMUNICATIONS SERVICES
    💼 SC-7 (5) DENY BY DEFAULT _ ALLOW BY EXCEPTION
    💼 SC-7 (6) RESPONSE TO RECOGNIZED FAILURES
    💼 SC-7 (7) PREVENT SPLIT TUNNELING FOR REMOTE DEVICES
    💼 SC-7 (8) ROUTE TRAFFIC TO AUTHENTICATED PROXY SERVERS
    💼 SC-7 (9) RESTRICT THREATENING OUTGOING COMMUNICATIONS TRAFFIC
    💼 SC-7 (10) PREVENT UNAUTHORIZED EXFILTRATION
    💼 SC-7 (11) RESTRICT INCOMING COMMUNICATIONS TRAFFIC
    💼 SC-7 (12) HOST-BASED PROTECTION
    💼 SC-7 (13) ISOLATION OF SECURITY TOOLS _ MECHANISMS _ SUPPORT COMPONENTS
    💼 SC-7 (14) PROTECTS AGAINST UNAUTHORIZED PHYSICAL CONNECTIONS
    💼 SC-7 (15) ROUTE PRIVILEGED NETWORK ACCESSES
    💼 SC-7 (16) PREVENT DISCOVERY OF COMPONENTS _ DEVICES
    💼 SC-7 (17) AUTOMATED ENFORCEMENT OF PROTOCOL FORMATS
    💼 SC-7 (18) FAIL SECURE
    💼 SC-7 (19) BLOCKS COMMUNICATION FROM NON-ORGANIZATIONALLY CONFIGURED HOSTS
    💼 SC-7 (20) DYNAMIC ISOLATION _ SEGREGATION
    💼 SC-7 (21) ISOLATION OF INFORMATION SYSTEM COMPONENTS
    💼 SC-7 (22) SEPARATE SUBNETS FOR CONNECTING TO DIFFERENT SECURITY DOMAINS
    💼 SC-7 (23) DISABLE SENDER FEEDBACK ON PROTOCOL VALIDATION FAILURE
💼 SC-8 TRANSMISSION CONFIDENTIALITY AND INTEGRITY422
    💼 SC-8 (1) CRYPTOGRAPHIC OR ALTERNATE PHYSICAL PROTECTION
    💼 SC-8 (2) PRE _ POST TRANSMISSION HANDLING
    💼 SC-8 (3) CRYPTOGRAPHIC PROTECTION FOR MESSAGE EXTERNALS
    💼 SC-8 (4) CONCEAL _ RANDOMIZE COMMUNICATIONS
💼 SC-9 TRANSMISSION CONFIDENTIALITY
💼 SC-10 NETWORK DISCONNECT
💼 SC-11 TRUSTED PATH1
    💼 SC-11 (1) LOGICAL ISOLATION
💼 SC-12 CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT544
    💼 SC-12 (1) AVAILABILITY
    💼 SC-12 (2) SYMMETRIC KEYS11
    💼 SC-12 (3) ASYMMETRIC KEYS11
    💼 SC-12 (4) PKI CERTIFICATES
    💼 SC-12 (5) PKI CERTIFICATES _ HARDWARE TOKENS
💼 SC-13 CRYPTOGRAPHIC PROTECTION411
    💼 SC-13 (1) FIPS-VALIDATED CRYPTOGRAPHY
    💼 SC-13 (2) NSA-APPROVED CRYPTOGRAPHY
    💼 SC-13 (3) INDIVIDUALS WITHOUT FORMAL ACCESS APPROVALS
    💼 SC-13 (4) DIGITAL SIGNATURES
💼 SC-14 PUBLIC ACCESS PROTECTIONS
💼 SC-15 COLLABORATIVE COMPUTING DEVICES4
    💼 SC-15 (1) PHYSICAL DISCONNECT
    💼 SC-15 (2) BLOCKING INBOUND _ OUTBOUND COMMUNICATIONS TRAFFIC
    💼 SC-15 (3) DISABLING _ REMOVAL IN SECURE WORK AREAS
    💼 SC-15 (4) EXPLICITLY INDICATE CURRENT PARTICIPANTS
💼 SC-16 TRANSMISSION OF SECURITY ATTRIBUTES1
    💼 SC-16 (1) INTEGRITY VALIDATION
💼 SC-17 PUBLIC KEY INFRASTRUCTURE CERTIFICATES22
💼 SC-18 MOBILE CODE5
    💼 SC-18 (1) IDENTIFY UNACCEPTABLE CODE _ TAKE CORRECTIVE ACTIONS
    💼 SC-18 (2) ACQUISITION _ DEVELOPMENT _ USE
    💼 SC-18 (3) PREVENT DOWNLOADING _ EXECUTION
    💼 SC-18 (4) PREVENT AUTOMATIC EXECUTION
    💼 SC-18 (5) ALLOW EXECUTION ONLY IN CONFINED ENVIRONMENTS
💼 SC-19 VOICE OVER INTERNET PROTOCOL
💼 SC-20 SECURE NAME _ ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE)2
    💼 SC-20 (1) CHILD SUBSPACES
    💼 SC-20 (2) DATA ORIGIN _ INTEGRITY
💼 SC-21 SECURE NAME _ ADDRESS RESOLUTION SERVICE (RECURSIVE OR CACHING RESOLVER)1
    💼 SC-21 (1) DATA ORIGIN _ INTEGRITY
💼 SC-22 ARCHITECTURE AND PROVISIONING FOR NAME _ ADDRESS RESOLUTION SERVICE
💼 SC-23 SESSION AUTHENTICITY4
    💼 SC-23 (1) INVALIDATE SESSION IDENTIFIERS AT LOGOUT
    💼 SC-23 (2) USER-INITIATED LOGOUTS _ MESSAGE DISPLAYS
    💼 SC-23 (4) UNIQUE SESSION IDENTIFIERS WITH RANDOMIZATION
    💼 SC-23 (5) ALLOWED CERTIFICATE AUTHORITIES
💼 SC-24 FAIL IN KNOWN STATE
💼 SC-25 THIN NODES
💼 SC-26 HONEYPOTS1
    💼 SC-26 (1) DETECTION OF MALICIOUS CODE
💼 SC-27 PLATFORM-INDEPENDENT APPLICATIONS
💼 SC-28 PROTECTION OF INFORMATION AT REST233
    💼 SC-28 (1) CRYPTOGRAPHIC PROTECTION
    💼 SC-28 (2) OFF-LINE STORAGE
💼 SC-29 HETEROGENEITY1
    💼 SC-29 (1) VIRTUALIZATION TECHNIQUES
💼 SC-30 CONCEALMENT AND MISDIRECTION5
    💼 SC-30 (1) VIRTUALIZATION TECHNIQUES
    💼 SC-30 (2) RANDOMNESS
    💼 SC-30 (3) CHANGE PROCESSING _ STORAGE LOCATIONS
    💼 SC-30 (4) MISLEADING INFORMATION
    💼 SC-30 (5) CONCEALMENT OF SYSTEM COMPONENTS
💼 SC-31 COVERT CHANNEL ANALYSIS3
    💼 SC-31 (1) TEST COVERT CHANNELS FOR EXPLOITABILITY
    💼 SC-31 (2) MAXIMUM BANDWIDTH
    💼 SC-31 (3) MEASURE BANDWIDTH IN OPERATIONAL ENVIRONMENTS
💼 SC-32 INFORMATION SYSTEM PARTITIONING
💼 SC-33 TRANSMISSION PREPARATION INTEGRITY
💼 SC-34 NON-MODIFIABLE EXECUTABLE PROGRAMS3
    💼 SC-34 (1) NO WRITABLE STORAGE
    💼 SC-34 (2) INTEGRITY PROTECTION _ READ-ONLY MEDIA
    💼 SC-34 (3) HARDWARE-BASED PROTECTION
💼 SC-35 HONEYCLIENTS
💼 SC-36 DISTRIBUTED PROCESSING AND STORAGE1
    💼 SC-36 (1) POLLING TECHNIQUES
💼 SC-37 OUT-OF-BAND CHANNELS1
    💼 SC-37 (1) ENSURE DELIVERY _ TRANSMISSION
💼 SC-38 OPERATIONS SECURITY
💼 SC-39 PROCESS ISOLATION2
    💼 SC-39 (1) HARDWARE SEPARATION
    💼 SC-39 (2) THREAD ISOLATION
💼 SC-40 WIRELESS LINK PROTECTION4
    💼 SC-40 (1) ELECTROMAGNETIC INTERFERENCE
    💼 SC-40 (2) REDUCE DETECTION POTENTIAL
    💼 SC-40 (3) IMITATIVE OR MANIPULATIVE COMMUNICATIONS DECEPTION
    💼 SC-40 (4) SIGNAL PARAMETER IDENTIFICATION
💼 SC-41 PORT AND I_O DEVICE ACCESS
💼 SC-42 SENSOR CAPABILITY AND DATA3
    💼 SC-42 (1) REPORTING TO AUTHORIZED INDIVIDUALS OR ROLES
    💼 SC-42 (2) AUTHORIZED USE
    💼 SC-42 (3) PROHIBIT USE OF DEVICES
💼 SC-43 USAGE RESTRICTIONS
💼 SC-44 DETONATION CHAMBERS