SC-3(1): Hardware Separation

CSF v2.0 References:

Threats Addressed:


(Not part of any baseline)

Previous Version:

Control Statement

Employ hardware separation mechanisms to implement security function isolation.

Supplemental Guidance

Hardware separation mechanisms include hardware ring architectures that are implemented within microprocessors and hardware-enforced address segmentation used to support logically distinct storage objects with separate attributes (i.e., readable, writeable).