SC: System And Communications Protection
Controls
SC-1: System And Communications Protection Policy And Procedures
Baseline(s):
- Low
- Moderate
- High
The organization: Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]: A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and Reviews and…
SC-2: Application Partitioning
Baseline(s):
- Moderate
- High
The information system separates user functionality (including user interface services) from information system management functionality.
SC-3: Security Function Isolation
Baseline(s):
- High
The information system isolates security functions from nonsecurity functions.
SC-4: Information In Shared Resources
Baseline(s):
- Moderate
- High
The information system prevents unauthorized and unintended information transfer via shared system resources.
SC-5: Denial Of Service Protection
Baseline(s):
- Low
- Moderate
- High
The information system protects against or limits the effects of the following types of denial of service attacks: [Assignment: organization-defined types of denial of service attacks or references to sources for such information] by employing [Assignment: organization-defined security safeguards].
SC-6: Resource Availability
Baseline(s):
The information system protects the availability of resources by allocating [Assignment: organization-defined resources] by [Selection (one or more); priority; quota; [Assignment: organization-defined security safeguards]].
SC-7: Boundary Protection
Baseline(s):
- Low
- Moderate
- High
The information system: Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system; Implements subnetworks for publicly accessible system components that are [Selection: physically; logically] separated from internal organizational networks; and Connects to external networks or information systems only through managed interfaces consisting of boundary protection…
SC-8: Transmission Confidentiality And Integrity
Baseline(s):
- Moderate
- High
The information system protects the [Selection (one or more): confidentiality; integrity] of transmitted information.
SC-10: Network Disconnect
Baseline(s):
- Moderate
- High
The information system terminates the network connection associated with a communications session at the end of the session or after [Assignment: organization-defined time period] of inactivity.
SC-11: Trusted Path
Baseline(s):
The information system establishes a trusted communications path between the user and the following security functions of the system: [Assignment: organization-defined security functions to include at a minimum, information system authentication and re-authentication].
SC-12: Cryptographic Key Establishment And Management
Baseline(s):
- Low
- Moderate
- High
The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].
SC-13: Cryptographic Protection
Baseline(s):
- Low
- Moderate
- High
The information system implements [Assignment: organization-defined cryptographic uses and type of cryptography required for each use] in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
SC-15: Collaborative Computing Devices
Baseline(s):
- Low
- Moderate
- High
The information system: Prohibits remote activation of collaborative computing devices with the following exceptions: [Assignment: organization-defined exceptions where remote activation is to be allowed]; and Provides an explicit indication of use to users physically present at the devices.
SC-16: Transmission Of Security Attributes
Baseline(s):
The information system associates [Assignment: organization-defined security attributes] with information exchanged between information systems and between system components.
SC-17: Public Key Infrastructure Certificates
Baseline(s):
- Moderate
- High
The organization issues public key certificates under an [Assignment: organization-defined certificate policy] or obtains public key certificates from an approved service provider.
SC-18: Mobile Code
Baseline(s):
- Moderate
- High
The organization: Defines acceptable and unacceptable mobile code and mobile code technologies; Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and Authorizes, monitors, and controls the use of mobile code within the information system.
SC-19: Voice Over Internet Protocol
Baseline(s):
- Moderate
- High
The organization: Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and Authorizes, monitors, and controls the use of VoIP within the information system.
SC-20: Secure Name / Address Resolution Service (Authoritative Source)
Baseline(s):
- Low
- Moderate
- High
The information system: Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries; and Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain…
SC-21: Secure Name / Address Resolution Service (Recursive Or Caching Resolver)
Baseline(s):
- Low
- Moderate
- High
The information system requests and performs data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.
SC-22: Architecture And Provisioning For Name / Address Resolution Service
Baseline(s):
- Low
- Moderate
- High
The information systems that collectively provide name/address resolution service for an organization are fault-tolerant and implement internal/external role separation.
SC-23: Session Authenticity
Baseline(s):
- Moderate
- High
The information system protects the authenticity of communications sessions.
SC-24: Fail In Known State
Baseline(s):
- High
The information system fails to a [Assignment: organization-defined known-state] for [Assignment: organization-defined types of failures] preserving [Assignment: organization-defined system state information] in failure.
SC-25: Thin Nodes
Baseline(s):
The organization employs [Assignment: organization-defined information system components] with minimal functionality and information storage.
SC-26: Honeypots
Baseline(s):
The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.
SC-27: Platform-Independent Applications
Baseline(s):
The information system includes: [Assignment: organization-defined platform-independent applications].
SC-28: Protection Of Information At Rest
Baseline(s):
- Moderate
- High
The information system protects the [Selection (one or more): confidentiality; integrity] of [Assignment: organization-defined information at rest].
SC-29: Heterogeneity
Baseline(s):
The organization employs a diverse set of information technologies for [Assignment: organization-defined information system components] in the implementation of the information system.
SC-30: Concealment And Misdirection
Baseline(s):
The organization employs [Assignment: organization-defined concealment and misdirection techniques] for [Assignment: organization-defined information systems] at [Assignment: organization-defined time periods] to confuse and mislead adversaries.
SC-31: Covert Channel Analysis
Baseline(s):
The organization: Performs a covert channel analysis to identify those aspects of communications within the information system that are potential avenues for covert [Selection (one or more): storage; timing] channels; and Estimates the maximum bandwidth of those channels.
SC-32: Information System Partitioning
Baseline(s):
The organization partitions the information system into [Assignment: organization-defined information system components] residing in separate physical domains or environments based on [Assignment: organization-defined circumstances for physical separation of components].
SC-34: Non-Modifiable Executable Programs
Baseline(s):
The information system at [Assignment: organization-defined information system components]: Loads and executes the operating environment from hardware-enforced, read-only media; and Loads and executes [Assignment: organization-defined applications] from hardware-enforced, read-only media.
SC-35: Honeyclients
Baseline(s):
The information system includes components that proactively seek to identify malicious websites and/or web-based malicious code.
SC-36: Distributed Processing And Storage
Baseline(s):
The organization distributes [Assignment: organization-defined processing and storage] across multiple physical locations.
SC-37: Out-Of-Band Channels
Baseline(s):
The organization employs [Assignment: organization-defined out-of-band channels] for the physical delivery or electronic transmission of [Assignment: organization-defined information, information system components, or devices] to [Assignment: organization-defined individuals or information systems].
SC-38: Operations Security
Baseline(s):
The organization employs [Assignment: organization-defined operations security safeguards] to protect key organizational information throughout the system development life cycle.
SC-39: Process Isolation
Baseline(s):
- Low
- Moderate
- High
The information system maintains a separate execution domain for each executing process.
SC-40: Wireless Link Protection
Baseline(s):
The information system protects external and internal [Assignment: organization-defined wireless links] from [Assignment: organization-defined types of signal parameter attacks or references to sources for such attacks].
SC-41: Port And I/O Device Access
Baseline(s):
The organization physically disables or removes [Assignment: organization-defined connection ports or input/output devices] on [Assignment: organization-defined information systems or information system components].
SC-42: Sensor Capability And Data
Baseline(s):
The information system: Prohibits the remote activation of environmental sensing capabilities with the following exceptions: [Assignment: organization-defined exceptions where remote activation of sensors is allowed]; and Provides an explicit indication of sensor use to [Assignment: organization-defined class of users].
SC-43: Usage Restrictions
Baseline(s):
The organization: Establishes usage restrictions and implementation guidance for [Assignment: organization-defined information system components] based on the potential to cause damage to the information system if used maliciously; and Authorizes, monitors, and controls the use of such components within the information system.
SC-44: Detonation Chambers
Baseline(s):
The organization employs a detonation chamber capability within [Assignment: organization-defined information system, system component, or location].