Skip to main content

💼 SC-5 Denial-of-service Protection

  • ID: /frameworks/nist-sp-800-53-r5/sc/05

Description

a. [Selection: Protect against; Limit] the effects of the following types of denial-of-service events: [Assignment: organization-defined types of denial-of-service events]; and b. Employ the following controls to achieve the denial-of-service objective: [Assignment: organization-defined controls by type of denial-of-service event].

Similar

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/guardduty/01
    • /frameworks/aws-fsbp-v1.0.0/sagemaker/04
  • Internal
    • ID: dec-c-e0e71b9f

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [GuardDuty.1] GuardDuty should be enabled1no data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [SageMaker.4] SageMaker AI endpoint production variants should have an initial instance count greater than 1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 FedRAMP High Security Controls → 💼 SC-5 Denial-of-service Protection (L)(M)(H)1no data
💼 FedRAMP Low Security Controls → 💼 SC-5 Denial-of-service Protection (L)(M)(H)1no data
💼 NIST CSF v2.0 → 💼 DE.CM-01: Networks and network services are monitored to find potentially adverse events145no data
💼 NIST CSF v2.0 → 💼 PR.IR-01: Networks and environments are protected from unauthorized logical access and usage95no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 SC-5(1) Denial-of-service Protection _ Restrict Ability to Attack Other Systems1no data
💼 SC-5(2) Denial-of-service Protection _ Capacity, Bandwidth, and Redundancy11no data
💼 SC-5(3) Denial-of-service Protection _ Detection and Monitoring1no data

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS GuardDuty is not enabled in all regions🟢1🟢 x6no data