Skip to main content

💼 SC System And Communications Protection

  • ID: /frameworks/nist-sp-800-53-r5/sc

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-94e34462

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 SC-1 Policy and Proceduresno data
💼 SC-2 Separation of System and User Functionality2no data
 💼 SC-2(1) Separation of System and User Functionality _ Interfaces for Non-privileged Usersno data
 💼 SC-2(2) Separation of System and User Functionality _ Disassociabilityno data
💼 SC-3 Security Function Isolation5no data
 💼 SC-3(1) Security Function Isolation _ Hardware Separationno data
 💼 SC-3(2) Security Function Isolation _ Access and Flow Control Functionsno data
 💼 SC-3(3) Security Function Isolation _ Minimize Nonsecurity Functionalityno data
 💼 SC-3(4) Security Function Isolation _ Module Coupling and Cohesivenessno data
 💼 SC-3(5) Security Function Isolation _ Layered Structuresno data
💼 SC-4 Information in Shared System Resources2no data
 💼 SC-4(1) Information in Shared System Resources _ Security Levelsno data
 💼 SC-4(2) Information in Shared System Resources _ Multilevel or Periods Processingno data
💼 SC-5 Denial-of-service Protection312no data
 💼 SC-5(1) Denial-of-service Protection _ Restrict Ability to Attack Other Systems1no data
 💼 SC-5(2) Denial-of-service Protection _ Capacity, Bandwidth, and Redundancy11no data
 💼 SC-5(3) Denial-of-service Protection _ Detection and Monitoring1no data
💼 SC-6 Resource Availabilityno data
💼 SC-7 Boundary Protection29452no data
 💼 SC-7(1) Boundary Protection _ Physically Separated Subnetworksno data
 💼 SC-7(2) Boundary Protection _ Public Accessno data
 💼 SC-7(3) Boundary Protection _ Access Points8no data
 💼 SC-7(4) Boundary Protection _ External Telecommunications Services28no data
 💼 SC-7(5) Boundary Protection _ Deny by Default — Allow by Exception418no data
 💼 SC-7(6) Boundary Protection _ Response to Recognized Failuresno data
 💼 SC-7(7) Boundary Protection _ Split Tunneling for Remote Devicesno data
 💼 SC-7(8) Boundary Protection _ Route Traffic to Authenticated Proxy Serversno data
 💼 SC-7(9) Boundary Protection _ Restrict Threatening Outgoing Communications Traffic14no data
 💼 SC-7(10) Boundary Protection _ Prevent Exfiltration6no data
 💼 SC-7(11) Boundary Protection _ Restrict Incoming Communications Traffic24no data
 💼 SC-7(12) Boundary Protection _ Host-based Protectionno data
 💼 SC-7(13) Boundary Protection _ Isolation of Security Tools, Mechanisms, and Support Componentsno data
 💼 SC-7(14) Boundary Protection _ Protect Against Unauthorized Physical Connectionsno data
 💼 SC-7(15) Boundary Protection _ Networked Privileged Accessesno data
 💼 SC-7(16) Boundary Protection _ Prevent Discovery of System Components25no data
 💼 SC-7(17) Boundary Protection _ Automated Enforcement of Protocol Formatsno data
 💼 SC-7(18) Boundary Protection _ Fail Secureno data
 💼 SC-7(19) Boundary Protection _ Block Communication from Non-organizationally Configured Hostsno data
 💼 SC-7(20) Boundary Protection _ Dynamic Isolation and Segregation8no data
 💼 SC-7(21) Boundary Protection _ Isolation of System Components24no data
 💼 SC-7(22) Boundary Protection _ Separate Subnets for Connecting to Different Security Domainsno data
 💼 SC-7(23) Boundary Protection _ Disable Sender Feedback on Protocol Validation Failureno data
 💼 SC-7(24) Boundary Protection _ Personally Identifiable Informationno data
 💼 SC-7(25) Boundary Protection _ Unclassified National Security System Connectionsno data
 💼 SC-7(26) Boundary Protection _ Classified National Security System Connectionsno data
 💼 SC-7(27) Boundary Protection _ Unclassified Non-national Security System Connectionsno data
 💼 SC-7(28) Boundary Protection _ Connections to Public Networksno data
 💼 SC-7(29) Boundary Protection _ Separate Subnets to Isolate Functionsno data
💼 SC-8 Transmission Confidentiality and Integrity5816no data
 💼 SC-8(1) Transmission Confidentiality and Integrity _ Cryptographic Protection815no data
 💼 SC-8(2) Transmission Confidentiality and Integrity _ Pre- and Post-transmission Handling7no data
 💼 SC-8(3) Transmission Confidentiality and Integrity _ Cryptographic Protection for Message Externalsno data
 💼 SC-8(4) Transmission Confidentiality and Integrity _ Conceal or Randomize Communicationsno data
 💼 SC-8(5) Transmission Confidentiality and Integrity _ Protected Distribution Systemno data
💼 SC-9 Transmission Confidentialityno data
💼 SC-10 Network Disconnectno data
💼 SC-11 Trusted Path1no data
 💼 SC-11(1) Trusted Path _ Irrefutable Communications Pathno data
💼 SC-12 Cryptographic Key Establishment and Management617no data
 💼 SC-12(1) Cryptographic Key Establishment and Management _ Availabilityno data
 💼 SC-12(2) Cryptographic Key Establishment and Management _ Symmetric Keys11no data
 💼 SC-12(3) Cryptographic Key Establishment and Management _ Asymmetric Keys6no data
 💼 SC-12(4) Cryptographic Key Establishment and Management _ PKI Certificatesno data
 💼 SC-12(5) Cryptographic Key Establishment and Management _ PKI Certificates / Hardware Tokensno data
 💼 SC-12(6) Cryptographic Key Establishment and Management _ Physical Control of Keysno data
💼 SC-13 Cryptographic Protection413no data
 💼 SC-13(1) Cryptographic Protection _ FIPS-validated Cryptographyno data
 💼 SC-13(2) Cryptographic Protection _ NSA-approved Cryptographyno data
 💼 SC-13(3) Cryptographic Protection _ Individuals Without Formal Access Approvalsno data
 💼 SC-13(4) Cryptographic Protection _ Digital Signaturesno data
💼 SC-14 Public Access Protectionsno data
💼 SC-15 Collaborative Computing Devices and Applications4no data
 💼 SC-15(1) Collaborative Computing Devices and Applications _ Physical or Logical Disconnectno data
 💼 SC-15(2) Collaborative Computing Devices and Applications _ Blocking Inbound and Outbound Communications Trafficno data
 💼 SC-15(3) Collaborative Computing Devices and Applications _ Disabling and Removal in Secure Work Areasno data
 💼 SC-15(4) Collaborative Computing Devices and Applications _ Explicitly Indicate Current Participantsno data
💼 SC-16 Transmission of Security and Privacy Attributes3no data
 💼 SC-16(1) Transmission of Security and Privacy Attributes _ Integrity Verificationno data
 💼 SC-16(2) Transmission of Security and Privacy Attributes _ Anti-spoofing Mechanismsno data
 💼 SC-16(3) Transmission of Security and Privacy Attributes _ Cryptographic Bindingno data
💼 SC-17 Public Key Infrastructure Certificatesno data
💼 SC-18 Mobile Code5no data
 💼 SC-18(1) Mobile Code _ Identify Unacceptable Code and Take Corrective Actionsno data
 💼 SC-18(2) Mobile Code _ Acquisition, Development, and Useno data
 💼 SC-18(3) Mobile Code _ Prevent Downloading and Executionno data
 💼 SC-18(4) Mobile Code _ Prevent Automatic Executionno data
 💼 SC-18(5) Mobile Code _ Allow Execution Only in Confined Environmentsno data
💼 SC-19 Voice Over Internet Protocolno data
💼 SC-20 Secure Name/address Resolution Service (authoritative Source)2no data
 💼 SC-20(1) Secure Name/address Resolution Service (authoritative Source) _ Child Subspacesno data
 💼 SC-20(2) Secure Name/address Resolution Service (authoritative Source) _ Data Origin and Integrityno data
💼 SC-21 Secure Name/address Resolution Service (recursive or Caching Resolver)1no data
 💼 SC-21(1) Secure Name/address Resolution Service (recursive or Caching Resolver) _ Data Origin and Integrityno data
💼 SC-22 Architecture and Provisioning for Name/address Resolution Serviceno data
💼 SC-23 Session Authenticity57no data
 💼 SC-23(1) Session Authenticity _ Invalidate Session Identifiers at Logoutno data
 💼 SC-23(2) Session Authenticity _ User-initiated Logouts and Message Displaysno data
 💼 SC-23(3) Session Authenticity _ Unique System-generated Session Identifiers6no data
 💼 SC-23(4) Session Authenticity _ Unique Session Identifiers with Randomizationno data
 💼 SC-23(5) Session Authenticity _ Allowed Certificate Authoritiesno data
💼 SC-24 Fail in Known Stateno data
💼 SC-25 Thin Nodesno data
💼 SC-26 Decoys1no data
 💼 SC-26(1) Decoys _ Detection of Malicious Codeno data
💼 SC-27 Platform-independent Applicationsno data
💼 SC-28 Protection of Information at Rest31625no data
 💼 SC-28(1) Protection of Information at Rest _ Cryptographic Protection1014no data
 💼 SC-28(2) Protection of Information at Rest _ Offline Storageno data
 💼 SC-28(3) Protection of Information at Rest _ Cryptographic Keys1no data
💼 SC-29 Heterogeneity1no data
 💼 SC-29(1) Heterogeneity _ Virtualization Techniquesno data
💼 SC-30 Concealment and Misdirection5no data
 💼 SC-30(1) Concealment and Misdirection _ Virtualization Techniquesno data
 💼 SC-30(2) Concealment and Misdirection _ Randomnessno data
 💼 SC-30(3) Concealment and Misdirection _ Change Processing and Storage Locationsno data
 💼 SC-30(4) Concealment and Misdirection _ Misleading Informationno data
 💼 SC-30(5) Concealment and Misdirection _ Concealment of System Componentsno data
💼 SC-31 Covert Channel Analysis3no data
 💼 SC-31(1) Covert Channel Analysis _ Test Covert Channels for Exploitabilityno data
 💼 SC-31(2) Covert Channel Analysis _ Maximum Bandwidthno data
 💼 SC-31(3) Covert Channel Analysis _ Measure Bandwidth in Operational Environmentsno data
💼 SC-32 System Partitioning1no data
 💼 SC-32(1) System Partitioning _ Separate Physical Domains for Privileged Functionsno data
💼 SC-33 Transmission Preparation Integrityno data
💼 SC-34 Non-modifiable Executable Programs3no data
 💼 SC-34(1) Non-modifiable Executable Programs _ No Writable Storageno data
 💼 SC-34(2) Non-modifiable Executable Programs _ Integrity Protection on Read-only Mediano data
 💼 SC-34(3) Non-modifiable Executable Programs _ Hardware-based Protectionno data
💼 SC-35 External Malicious Code Identificationno data
💼 SC-36 Distributed Processing and Storage26no data
 💼 SC-36(1) Distributed Processing and Storage _ Polling Techniquesno data
 💼 SC-36(2) Distributed Processing and Storage _ Synchronizationno data
💼 SC-37 Out-of-band Channels1no data
 💼 SC-37(1) Out-of-band Channels _ Ensure Delivery and Transmissionno data
💼 SC-38 Operations Securityno data
💼 SC-39 Process Isolation2no data
 💼 SC-39(1) Process Isolation _ Hardware Separationno data
 💼 SC-39(2) Process Isolation _ Separate Execution Domain Per Threadno data
💼 SC-40 Wireless Link Protection4no data
 💼 SC-40(1) Wireless Link Protection _ Electromagnetic Interferenceno data
 💼 SC-40(2) Wireless Link Protection _ Reduce Detection Potentialno data
 💼 SC-40(3) Wireless Link Protection _ Imitative or Manipulative Communications Deceptionno data
 💼 SC-40(4) Wireless Link Protection _ Signal Parameter Identificationno data
💼 SC-41 Port and I/O Device Accessno data
💼 SC-42 Sensor Capability and Data5no data
 💼 SC-42(1) Sensor Capability and Data _ Reporting to Authorized Individuals or Rolesno data
 💼 SC-42(2) Sensor Capability and Data _ Authorized Useno data
 💼 SC-42(3) Sensor Capability and Data _ Prohibit Use of Devicesno data
 💼 SC-42(4) Sensor Capability and Data _ Notice of Collectionno data
 💼 SC-42(5) Sensor Capability and Data _ Collection Minimizationno data
💼 SC-43 Usage Restrictionsno data
💼 SC-44 Detonation Chambersno data
💼 SC-45 System Time Synchronization2no data
 💼 SC-45(1) System Time Synchronization _ Synchronization with Authoritative Time Sourceno data
 💼 SC-45(2) System Time Synchronization _ Secondary Authoritative Time Sourceno data
💼 SC-46 Cross Domain Policy Enforcementno data
💼 SC-47 Alternate Communications Pathsno data
💼 SC-48 Sensor Relocation1no data
 💼 SC-48(1) Sensor Relocation _ Dynamic Relocation of Sensors or Monitoring Capabilitiesno data
💼 SC-49 Hardware-enforced Separation and Policy Enforcementno data
💼 SC-50 Software-enforced Separation and Policy Enforcementno data
💼 SC-51 Hardware-based Protectionno data