SC-01
|
Policy and Procedures |
|
|
|
|
SC-02
|
Separation of System and User Functionality |
|
|
|
|
SC-02(01)
|
Interfaces for Non-privileged Users |
|
|
|
|
SC-02(02)
|
Disassociability |
|
|
|
|
SC-03
|
Security Function Isolation |
|
|
|
|
SC-03(01)
|
Hardware Separation |
|
|
|
|
SC-03(02)
|
Access and Flow Control Functions |
|
|
|
|
SC-03(03)
|
Minimize Nonsecurity Functionality |
|
|
|
|
SC-03(04)
|
Module Coupling and Cohesiveness |
|
|
|
|
SC-03(05)
|
Layered Structures |
|
|
|
|
SC-04
|
Information in Shared System Resources |
|
|
|
|
SC-04(01)
|
Security Levels |
Incorporated into
SC-4.
|
SC-04(02)
|
Multilevel or Periods Processing |
|
|
|
|
SC-05
|
Denial-of-service Protection |
|
|
|
|
SC-05(01)
|
Restrict Ability to Attack Other Systems |
|
|
|
|
SC-05(02)
|
Capacity, Bandwidth, and Redundancy |
|
|
|
|
SC-05(03)
|
Detection and Monitoring |
|
|
|
|
SC-06
|
Resource Availability |
|
|
|
|
SC-07
|
Boundary Protection |
|
|
|
|
SC-07(01)
|
Physically Separated Subnetworks |
Incorporated into
SC-7.
|
SC-07(02)
|
Public Access |
Incorporated into
SC-7.
|
SC-07(03)
|
Access Points |
|
|
|
|
SC-07(04)
|
External Telecommunications Services |
|
|
|
|
SC-07(05)
|
Deny by Default — Allow by Exception |
|
|
|
|
SC-07(06)
|
Response to Recognized Failures |
Incorporated into
SC-7.18.
|
SC-07(07)
|
Split Tunneling for Remote Devices |
|
|
|
|
SC-07(08)
|
Route Traffic to Authenticated Proxy Servers |
|
|
|
|
SC-07(09)
|
Restrict Threatening Outgoing Communications Traffic |
|
|
|
|
SC-07(10)
|
Prevent Exfiltration |
|
|
|
|
SC-07(11)
|
Restrict Incoming Communications Traffic |
|
|
|
|
SC-07(12)
|
Host-based Protection |
|
|
|
|
SC-07(13)
|
Isolation of Security Tools, Mechanisms, and Support Components |
|
|
|
|
SC-07(14)
|
Protect Against Unauthorized Physical Connections |
|
|
|
|
SC-07(15)
|
Networked Privileged Accesses |
|
|
|
|
SC-07(16)
|
Prevent Discovery of System Components |
|
|
|
|
SC-07(17)
|
Automated Enforcement of Protocol Formats |
|
|
|
|
SC-07(18)
|
Fail Secure |
|
|
|
|
SC-07(19)
|
Block Communication from Non-organizationally Configured Hosts |
|
|
|
|
SC-07(20)
|
Dynamic Isolation and Segregation |
|
|
|
|
SC-07(21)
|
Isolation of System Components |
|
|
|
|
SC-07(22)
|
Separate Subnets for Connecting to Different Security Domains |
|
|
|
|
SC-07(23)
|
Disable Sender Feedback on Protocol Validation Failure |
|
|
|
|
SC-07(24)
|
Personally Identifiable Information |
|
|
|
|
SC-07(25)
|
Unclassified National Security System Connections |
|
|
|
|
SC-07(26)
|
Classified National Security System Connections |
|
|
|
|
SC-07(27)
|
Unclassified Non-national Security System Connections |
|
|
|
|
SC-07(28)
|
Connections to Public Networks |
|
|
|
|
SC-07(29)
|
Separate Subnets to Isolate Functions |
|
|
|
|
SC-08
|
Transmission Confidentiality and Integrity |
|
|
|
|
SC-08(01)
|
Cryptographic Protection |
|
|
|
|
SC-08(02)
|
Pre- and Post-transmission Handling |
|
|
|
|
SC-08(03)
|
Cryptographic Protection for Message Externals |
|
|
|
|
SC-08(04)
|
Conceal or Randomize Communications |
|
|
|
|
SC-08(05)
|
Protected Distribution System |
|
|
|
|
SC-09
|
Transmission Confidentiality |
Incorporated into
SC-8.
|
SC-10
|
Network Disconnect |
|
|
|
|
SC-11
|
Trusted Path |
|
|
|
|
SC-11(01)
|
Irrefutable Communications Path |
|
|
|
|
SC-12
|
Cryptographic Key Establishment and Management |
|
|
|
|
SC-12(01)
|
Availability |
|
|
|
|
SC-12(02)
|
Symmetric Keys |
|
|
|
|
SC-12(03)
|
Asymmetric Keys |
|
|
|
|
SC-12(04)
|
PKI Certificates |
Incorporated into
SC-12.3.
|
SC-12(05)
|
PKI Certificates / Hardware Tokens |
Incorporated into
SC-12.3.
|
SC-12(06)
|
Physical Control of Keys |
|
|
|
|
SC-13
|
Cryptographic Protection |
|
|
|
|
SC-13(01)
|
FIPS-validated Cryptography |
Incorporated into
SC-13.
|
SC-13(02)
|
NSA-approved Cryptography |
Incorporated into
SC-13.
|
SC-13(03)
|
Individuals Without Formal Access Approvals |
Incorporated into
SC-13.
|
SC-13(04)
|
Digital Signatures |
Incorporated into
SC-13.
|
SC-14
|
Public Access Protections |
Incorporated into
AC-2, AC-3, AC-5, AC-6, SI-3, SI-4, SI-5, SI-7, AND SI-10.
|
SC-15
|
Collaborative Computing Devices and Applications |
|
|
|
|
SC-15(01)
|
Physical or Logical Disconnect |
|
|
|
|
SC-15(02)
|
Blocking Inbound and Outbound Communications Traffic |
Incorporated into
SC-7.
|
SC-15(03)
|
Disabling and Removal in Secure Work Areas |
|
|
|
|
SC-15(04)
|
Explicitly Indicate Current Participants |
|
|
|
|
SC-16
|
Transmission of Security and Privacy Attributes |
|
|
|
|
SC-16(01)
|
Integrity Verification |
|
|
|
|
SC-16(02)
|
Anti-spoofing Mechanisms |
|
|
|
|
SC-16(03)
|
Cryptographic Binding |
|
|
|
|
SC-17
|
Public Key Infrastructure Certificates |
|
|
|
|
SC-18
|
Mobile Code |
|
|
|
|
SC-18(01)
|
Identify Unacceptable Code and Take Corrective Actions |
|
|
|
|
SC-18(02)
|
Acquisition, Development, and Use |
|
|
|
|
SC-18(03)
|
Prevent Downloading and Execution |
|
|
|
|
SC-18(04)
|
Prevent Automatic Execution |
|
|
|
|
SC-18(05)
|
Allow Execution Only in Confined Environments |
|
|
|
|
SC-19
|
Voice Over Internet Protocol |
|
|
|
|
SC-20
|
Secure Name/Address Resolution Service (Authoritative Source) |
|
|
|
|
SC-20(01)
|
Child Subspaces |
Incorporated into
SC-20.
|
SC-20(02)
|
Data Origin and Integrity |
|
|
|
|
SC-21
|
Secure Name/Address Resolution Service (Recursive or Caching Resolver) |
|
|
|
|
SC-21(01)
|
Data Origin and Integrity |
Incorporated into
SC-21.
|
SC-22
|
Architecture and Provisioning for Name/Address Resolution Service |
|
|
|
|
SC-23
|
Session Authenticity |
|
|
|
|
SC-23(01)
|
Invalidate Session Identifiers at Logout |
|
|
|
|
SC-23(02)
|
User-initiated Logouts and Message Displays |
Incorporated into
AC-12.1.
|
SC-23(03)
|
Unique System-generated Session Identifiers |
|
|
|
|
SC-23(04)
|
Unique Session Identifiers with Randomization |
Incorporated into
SC-23.3.
|
SC-23(05)
|
Allowed Certificate Authorities |
|
|
|
|
SC-24
|
Fail in Known State |
|
|
|
|
SC-25
|
Thin Nodes |
|
|
|
|
SC-26
|
Decoys |
|
|
|
|
SC-26(01)
|
Detection of Malicious Code |
Incorporated into
SC-35.
|
SC-27
|
Platform-independent Applications |
|
|
|
|
SC-28
|
Protection of Information at Rest |
|
|
|
|
SC-28(01)
|
Cryptographic Protection |
|
|
|
|
SC-28(02)
|
Offline Storage |
|
|
|
|
SC-28(03)
|
Cryptographic Keys |
|
|
|
|
SC-29
|
Heterogeneity |
|
|
|
|
SC-29(01)
|
Virtualization Techniques |
|
|
|
|
SC-30
|
Concealment and Misdirection |
|
|
|
|
SC-30(01)
|
Virtualization Techniques |
Incorporated into
SC-29.1.
|
SC-30(02)
|
Randomness |
|
|
|
|
SC-30(03)
|
Change Processing and Storage Locations |
|
|
|
|
SC-30(04)
|
Misleading Information |
|
|
|
|
SC-30(05)
|
Concealment of System Components |
|
|
|
|
SC-31
|
Covert Channel Analysis |
|
|
|
|
SC-31(01)
|
Test Covert Channels for Exploitability |
|
|
|
|
SC-31(02)
|
Maximum Bandwidth |
|
|
|
|
SC-31(03)
|
Measure Bandwidth in Operational Environments |
|
|
|
|
SC-32
|
System Partitioning |
|
|
|
|
SC-32(01)
|
Separate Physical Domains for Privileged Functions |
|
|
|
|
SC-33
|
Transmission Preparation Integrity |
Incorporated into
SC-8.
|
SC-34
|
Non-modifiable Executable Programs |
|
|
|
|
SC-34(01)
|
No Writable Storage |
|
|
|
|
SC-34(02)
|
Integrity Protection on Read-only Media |
|
|
|
|
SC-34(03)
|
Hardware-based Protection |
Moved to
SC-51.
|
SC-35
|
External Malicious Code Identification |
|
|
|
|
SC-36
|
Distributed Processing and Storage |
|
|
|
|
SC-36(01)
|
Polling Techniques |
|
|
|
|
SC-36(02)
|
Synchronization |
|
|
|
|
SC-37
|
Out-of-band Channels |
|
|
|
|
SC-37(01)
|
Ensure Delivery and Transmission |
|
|
|
|
SC-38
|
Operations Security |
|
|
|
|
SC-39
|
Process Isolation |
|
|
|
|
SC-39(01)
|
Hardware Separation |
|
|
|
|
SC-39(02)
|
Separate Execution Domain Per Thread |
|
|
|
|
SC-40
|
Wireless Link Protection |
|
|
|
|
SC-40(01)
|
Electromagnetic Interference |
|
|
|
|
SC-40(02)
|
Reduce Detection Potential |
|
|
|
|
SC-40(03)
|
Imitative or Manipulative Communications Deception |
|
|
|
|
SC-40(04)
|
Signal Parameter Identification |
|
|
|
|
SC-41
|
Port and I/O Device Access |
|
|
|
|
SC-42
|
Sensor Capability and Data |
|
|
|
|
SC-42(01)
|
Reporting to Authorized Individuals or Roles |
|
|
|
|
SC-42(02)
|
Authorized Use |
|
|
|
|
SC-42(03)
|
Prohibit Use of Devices |
Incorporated into
SC-42.
|
SC-42(04)
|
Notice of Collection |
|
|
|
|
SC-42(05)
|
Collection Minimization |
|
|
|
|
SC-43
|
Usage Restrictions |
|
|
|
|
SC-44
|
Detonation Chambers |
|
|
|
|
SC-45
|
System Time Synchronization |
|
|
|
|
SC-45(01)
|
Synchronization with Authoritative Time Source |
|
|
|
|
SC-45(02)
|
Secondary Authoritative Time Source |
|
|
|
|
SC-46
|
Cross Domain Policy Enforcement |
|
|
|
|
SC-47
|
Alternate Communications Paths |
|
|
|
|
SC-48
|
Sensor Relocation |
|
|
|
|
SC-48(01)
|
Dynamic Relocation of Sensors or Monitoring Capabilities |
|
|
|
|
SC-49
|
Hardware-enforced Separation and Policy Enforcement |
|
|
|
|
SC-50
|
Software-enforced Separation and Policy Enforcement |
|
|
|
|
SC-51
|
Hardware-based Protection |
|
|
|
|