System and Communications Protection (SC)

Level 2

Separate user functionality from system management functionality.


Login

System and Communications Protection (SC)

Prevent unauthorized and unintended information transfer via shared system resources.


Login

System and Communications Protection (SC)

Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.


Login

System and Communications Protection (SC)

Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).


Login

System and Communications Protection (SC)

Level 2

Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling).


Login

System and Communications Protection (SC)

Level 2

Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards.


Login

System and Communications Protection (SC)

Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.


Login

System and Communications Protection (SC)

Level 2

Establish and manage cryptographic keys for cryptography employed in organizational systems.


Login

System and Communications Protection (SC)

Level 2

Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.


Login

System and Communications Protection (SC)

Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.


Login