SC-36(1): Polling Techniques

Threats Addressed:


(Not part of any baseline)

Previous Version:

Control Statement

  1. Employ polling techniques to identify potential faults, errors, or compromises to the following processing and storage components: [Assignment: organization-defined distributed processing and storage components]; and
  2. Take the following actions in response to identified faults, errors, or compromises: [Assignment: organization-defined actions].

Supplemental Guidance

Distributed processing and/or storage may be used to reduce opportunities for adversaries to compromise the confidentiality, integrity, or availability of organizational information and systems. However, the distribution of processing and storage components does not prevent adversaries from compromising one or more of the components. Polling compares the processing results and/or storage content from the distributed components and subsequently votes on the outcomes. Polling identifies potential faults, compromises, or errors in the distributed processing and storage components.