SC: System And Communications Protection

Controls

SC-1: System And Communications Protection Policy And Procedures

Baseline(s):

  • Low
  • Moderate
  • High

The organization: Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]: A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and Reviews and…

SC-2: Application Partitioning

Baseline(s):

  • Moderate
  • High

The information system separates user functionality (including user interface services) from information system management functionality.

SC-5: Denial Of Service Protection

Baseline(s):

  • Low
  • Moderate
  • High

The information system protects against or limits the effects of the following types of denial of service attacks: [Assignment: organization-defined types of denial of service attacks or references to sources for such information] by employing [Assignment: organization-defined security safeguards].

SC-6: Resource Availability

Baseline(s):

(Not part of any baseline)

The information system protects the availability of resources by allocating [Assignment: organization-defined resources] by [Selection (one or more); priority; quota; [Assignment: organization-defined security safeguards]].

SC-7: Boundary Protection

Baseline(s):

  • Low
  • Moderate
  • High

The information system: Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system; Implements subnetworks for publicly accessible system components that are [Selection: physically; logically] separated from internal organizational networks; and Connects to external networks or information systems only through managed interfaces consisting of boundary protection…

SC-10: Network Disconnect

Baseline(s):

  • Moderate
  • High

The information system terminates the network connection associated with a communications session at the end of the session or after [Assignment: organization-defined time period] of inactivity.

SC-11: Trusted Path

Baseline(s):

(Not part of any baseline)

The information system establishes a trusted communications path between the user and the following security functions of the system: [Assignment: organization-defined security functions to include at a minimum, information system authentication and re-authentication].

SC-12: Cryptographic Key Establishment And Management

Baseline(s):

  • Low
  • Moderate
  • High

The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].

SC-13: Cryptographic Protection

Baseline(s):

  • Low
  • Moderate
  • High

The information system implements [Assignment: organization-defined cryptographic uses and type of cryptography required for each use] in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.

SC-15: Collaborative Computing Devices

Baseline(s):

  • Low
  • Moderate
  • High

The information system: Prohibits remote activation of collaborative computing devices with the following exceptions: [Assignment: organization-defined exceptions where remote activation is to be allowed]; and Provides an explicit indication of use to users physically present at the devices.

SC-16: Transmission Of Security Attributes

Baseline(s):

(Not part of any baseline)

The information system associates [Assignment: organization-defined security attributes] with information exchanged between information systems and between system components.

SC-17: Public Key Infrastructure Certificates

Baseline(s):

  • Moderate
  • High

The organization issues public key certificates under an [Assignment: organization-defined certificate policy] or obtains public key certificates from an approved service provider.

SC-18: Mobile Code

Baseline(s):

  • Moderate
  • High

The organization: Defines acceptable and unacceptable mobile code and mobile code technologies; Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and Authorizes, monitors, and controls the use of mobile code within the information system.

SC-19: Voice Over Internet Protocol

Baseline(s):

  • Moderate
  • High

The organization: Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and Authorizes, monitors, and controls the use of VoIP within the information system.

SC-20: Secure Name / Address Resolution Service (Authoritative Source)

Baseline(s):

  • Low
  • Moderate
  • High

The information system: Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries; and Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain…

SC-24: Fail In Known State

Baseline(s):

  • High

The information system fails to a [Assignment: organization-defined known-state] for [Assignment: organization-defined types of failures] preserving [Assignment: organization-defined system state information] in failure.

SC-25: Thin Nodes

Baseline(s):

(Not part of any baseline)

The organization employs [Assignment: organization-defined information system components] with minimal functionality and information storage.

SC-26: Honeypots

Baseline(s):

(Not part of any baseline)

The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.

SC-28: Protection Of Information At Rest

Baseline(s):

  • Moderate
  • High

The information system protects the [Selection (one or more): confidentiality; integrity] of [Assignment: organization-defined information at rest].

SC-29: Heterogeneity

Baseline(s):

(Not part of any baseline)

The organization employs a diverse set of information technologies for [Assignment: organization-defined information system components] in the implementation of the information system.

SC-30: Concealment And Misdirection

Baseline(s):

(Not part of any baseline)

The organization employs [Assignment: organization-defined concealment and misdirection techniques] for [Assignment: organization-defined information systems] at [Assignment: organization-defined time periods] to confuse and mislead adversaries.

SC-31: Covert Channel Analysis

Baseline(s):

(Not part of any baseline)

The organization: Performs a covert channel analysis to identify those aspects of communications within the information system that are potential avenues for covert [Selection (one or more): storage; timing] channels; and Estimates the maximum bandwidth of those channels.

SC-32: Information System Partitioning

Baseline(s):

(Not part of any baseline)

The organization partitions the information system into [Assignment: organization-defined information system components] residing in separate physical domains or environments based on [Assignment: organization-defined circumstances for physical separation of components].

SC-34: Non-Modifiable Executable Programs

Baseline(s):

(Not part of any baseline)

The information system at [Assignment: organization-defined information system components]: Loads and executes the operating environment from hardware-enforced, read-only media; and Loads and executes [Assignment: organization-defined applications] from hardware-enforced, read-only media.

SC-35: Honeyclients

Baseline(s):

(Not part of any baseline)

The information system includes components that proactively seek to identify malicious websites and/or web-based malicious code.

SC-37: Out-Of-Band Channels

Baseline(s):

(Not part of any baseline)

The organization employs [Assignment: organization-defined out-of-band channels] for the physical delivery or electronic transmission of [Assignment: organization-defined information, information system components, or devices] to [Assignment: organization-defined individuals or information systems].

SC-38: Operations Security

Baseline(s):

(Not part of any baseline)

The organization employs [Assignment: organization-defined operations security safeguards] to protect key organizational information throughout the system development life cycle.

SC-39: Process Isolation

Baseline(s):

  • Low
  • Moderate
  • High

The information system maintains a separate execution domain for each executing process.

SC-40: Wireless Link Protection

Baseline(s):

(Not part of any baseline)

The information system protects external and internal [Assignment: organization-defined wireless links] from [Assignment: organization-defined types of signal parameter attacks or references to sources for such attacks].

SC-41: Port And I/O Device Access

Baseline(s):

(Not part of any baseline)

The organization physically disables or removes [Assignment: organization-defined connection ports or input/output devices] on [Assignment: organization-defined information systems or information system components].

SC-42: Sensor Capability And Data

Baseline(s):

(Not part of any baseline)

The information system: Prohibits the remote activation of environmental sensing capabilities with the following exceptions: [Assignment: organization-defined exceptions where remote activation of sensors is allowed]; and Provides an explicit indication of sensor use to [Assignment: organization-defined class of users].

SC-43: Usage Restrictions

Baseline(s):

(Not part of any baseline)

The organization: Establishes usage restrictions and implementation guidance for [Assignment: organization-defined information system components] based on the potential to cause damage to the information system if used maliciously; and Authorizes, monitors, and controls the use of such components within the information system.

SC-44: Detonation Chambers

Baseline(s):

(Not part of any baseline)

The organization employs a detonation chamber capability within [Assignment: organization-defined information system, system component, or location].