System and Communications Protection (SC)

Level 2

Control and monitor the use of mobile code.


Login

System and Communications Protection (SC)

Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.


Login

System and Communications Protection (SC)

Protect the authenticity of communications sessions.


Login

System and Communications Protection (SC)

Level 2

Protect the confidentiality of CUI at rest.


Login

System and Communications Protection (SC)

Level 3

Employ physical isolation techniques or logical isolation techniques or both in organizational systems and system components.


Login

System and Information Integrity (SI)

Identify, report, and correct information and information system flaws in a timely manner.


Login

System and Information Integrity (SI)

Provide protection from malicious code at appropriate locations within organizational information systems.


Login

System and Information Integrity (SI)

Update malicious code protection mechanisms when new releases are available.


Login

System and Information Integrity (SI)

Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.


Login

System and Information Integrity (SI)

Identify, report, and correct system flaws in a timely manner.


Login