Filter

Access Control (AC)

Enforce [Assignment: organization-defined limitations] on embedding data types within other data types.


Login

Access Control (AC)

Enforce information flow control based on [Assignment: organization-defined metadata].


Login

Access Control (AC)

Enforce one-way information flows through hardware-based flow control mechanisms.


Login

Access Control (AC)

(a) Enforce information flow control using [Assignment: organization-defined security or privacy policy filters] as a basis for flow control decisions for [Assignment: organization-defined information flows]; and (b) [Selection (one or more): Block; Strip; Modify; Quarantine] data after a filter processing failure in accordance with [Assignment: organization-defined security or privacy policy].


Login

Access Control (AC)

Enforce the use of human reviews for [Assignment: organization-defined information flows] under the following conditions: [Assignment: organization-defined conditions].


Login

Access Control (AC)

Provide the capability for privileged administrators to enable and disable [Assignment: organization-defined security or privacy policy filters] under the following conditions: [Assignment: organization-defined conditions].


Login

Access Control (AC)

Provide the capability for privileged administrators to configure [Assignment: organization-defined security or privacy policy filters] to support different security or privacy policies.


Login

Access Control (AC)

When transferring information between different security domains, use [Assignment: organization-defined data type identifiers] to validate data essential for information flow decisions.


Login

Access Control (AC)

When transferring information between different security domains, decompose information into [Assignment: organization-defined policy-relevant subcomponents] for submission to policy enforcement mechanisms.


Login

Access Control (AC)

When transferring information between different security domains, implement [Assignment: organization-defined security or privacy policy filters] requiring fully enumerated formats that restrict data structure and content.


Login