SC-31: Covert Channel Analysis
Control Family:
CSF v1.1 References:
PF v1.0 References:
Threats Addressed:
Baselines:
- Low
N/A
- Moderate
N/A
- High
N/A
- Privacy
N/A
Previous Version:
- NIST Special Publication 800-53 Revision 4:
- SC-31: Covert Channel Analysis
Control Statement
- Perform a covert channel analysis to identify those aspects of communications within the system that are potential avenues for covert [Assignment (one or more): storage, timing] channels; and
- Estimate the maximum bandwidth of those channels.
Supplemental Guidance
Developers are in the best position to identify potential areas within systems that might lead to covert channels. Covert channel analysis is a meaningful activity when there is the potential for unauthorized information flows across security domains, such as in the case of systems that contain export-controlled information and have connections to external networks (i.e., networks that are not controlled by organizations). Covert channel analysis is also useful for multilevel secure systems, multiple security level systems, and cross-domain systems.
Control Enhancements
SC-31(1): Test Covert Channels for Exploitability
Baseline(s):
Test a subset of the identified covert channels to determine the channels that are exploitable.
SC-31(2): Maximum Bandwidth
Baseline(s):
Reduce the maximum bandwidth for identified covert [Assignment (one or more): storage, timing] channels to [Assignment: organization-defined values].
SC-31(3): Measure Bandwidth in Operational Environments
Baseline(s):
Measure the bandwidth of [Assignment: organization-defined subset of identified covert channels] in the operational environment of the system.