SC-3(1): Hardware Separation

Threats Addressed:


(Not part of any baseline)

Next Version:

Control Statement

The information system utilizes underlying hardware separation mechanisms to implement security function isolation.

Supplemental Guidance

Underlying hardware separation mechanisms include, for example, hardware ring architectures, commonly implemented within microprocessors, and hardware-enforced address segmentation used to support logically distinct storage objects with separate attributes (i.e., readable, writeable).