3.18 SYSTEM AND COMMUNICATIONS PROTECTION
Quick link to System and Communications Protection Summary Table
Table of contents
- -- SC-1 POLICY AND PROCEDURES
- -- SC-2 SEPARATION OF SYSTEM AND USER FUNCTIONALITY
- -- SC-3 SECURITY FUNCTION ISOLATION
- -- SC-4 INFORMATION IN SHARED SYSTEM RESOURCES
- -- SC-5 DENIAL-OF-SERVICE PROTECTION
- -- SC-6 RESOURCE AVAILABILITY
- -- SC-7 BOUNDARY PROTECTION
- -- SC-8 TRANSMISSION CONFIDENTIALITY AND INTEGRITY
- -- SC-9 TRANSMISSION CONFIDENTIALITY
- -- SC-10 NETWORK DISCONNECT
- -- SC-11 TRUSTED PATH
- -- SC-12 CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT
- -- SC-13 CRYPTOGRAPHIC PROTECTION
- -- SC-14 PUBLIC ACCESS PROTECTIONS
- -- SC-15 COLLABORATIVE COMPUTING DEVICES AND APPLICATIONS
- -- SC-16 TRANSMISSION OF SECURITY AND PRIVACY ATTRIBUTES
- -- SC-17 PUBLIC KEY INFRASTRUCTURE CERTIFICATES
- -- SC-18 MOBILE CODE
- -- SC-19 VOICE OVER INTERNET PROTOCOL
- -- SC-20 SECURE NAME/ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE)
- -- SC-21 SECURE NAME/ADDRESS RESOLUTION SERVICE (RECURSIVE OR CACHING RESOLVER)
- -- SC-22 ARCHITECTURE AND PROVISIONING FOR NAME/ADDRESS RESOLUTION SERVICE
- -- SC-23 SESSION AUTHENTICITY
- -- SC-24 FAIL IN KNOWN STATE
- -- SC-25 THIN NODES
- -- SC-26 DECOYS
- -- SC-27 PLATFORM-INDEPENDENT APPLICATIONS
- -- SC-28 PROTECTION OF INFORMATION AT REST
- -- SC-29 HETEROGENEITY
- -- SC-30 CONCEALMENT AND MISDIRECTION
- -- SC-31 COVERT CHANNEL ANALYSIS
- -- SC-32 SYSTEM PARTITIONING
- -- SC-33 TRANSMISSION PREPARATION INTEGRITY
- -- SC-34 NON-MODIFIABLE EXECUTABLE PROGRAMS
- -- SC-35 EXTERNAL MALICIOUS CODE IDENTIFICATION
- -- SC-36 DISTRIBUTED PROCESSING AND STORAGE
- -- SC-37 OUT-OF-BAND CHANNELS
- -- SC-38 OPERATIONS SECURITY
- -- SC-39 PROCESS ISOLATION
- -- SC-40 WIRELESS LINK PROTECTION
- -- SC-41 PORT AND I/O DEVICE ACCESS
- -- SC-42 SENSOR CAPABILITY AND DATA
- -- SC-43 USAGE RESTRICTIONS
- -- SC-44 DETONATION CHAMBERS
- -- SC-45 SYSTEM TIME SYNCHRONIZATION
- -- SC-46 CROSS DOMAIN POLICY ENFORCEMENT
- -- SC-47 ALTERNATE COMMUNICATIONS PATHS
- -- SC-48 SENSOR RELOCATION
- -- SC-49 HARDWARE-ENFORCED SEPARATION AND POLICY ENFORCEMENT
- -- SC-50 SOFTWARE-ENFORCED SEPARATION AND POLICY ENFORCEMENT
- -- SC-51 HARDWARE-BASED PROTECTION