System and Communications Protection (SC)

Include system components that proactively seek to identify network-based malicious code or malicious websites.


Login

System and Communications Protection (SC)

Distribute the following processing and storage components across multiple [Selection: physical locations; logical domains]: [Assignment: organization-defined processing and storage components].


Login

System and Communications Protection (SC)

(a) Employ polling techniques to identify potential faults, errors, or compromises to the following processing and storage components: [Assignment: organization-defined distributed processing and storage components]; and (b) Take the following actions in response to identified faults, errors, or compromises: [Assignment: organization-defined actions].


Login

System and Communications Protection (SC)

Synchronize the following duplicate systems or system components: [Assignment: organization-defined duplicate systems or system components].


Login

System and Communications Protection (SC)

Employ the following out-of-band channels for the physical delivery or electronic transmission of [Assignment: organization-defined information, system components, or devices] to [Assignment: organization-defined individuals or systems]: [Assignment: organization-defined out-of-band channels].


Login

System and Communications Protection (SC)

Employ [Assignment: organization-defined controls] to ensure that only [Assignment: organization-defined individuals or systems] receive the following information, system components, or devices: [Assignment: organization-defined information, system components, or devices].


Login

System and Communications Protection (SC)

Employ the following operations security controls to protect key organizational information throughout the system development life cycle: [Assignment: organization-defined operations security controls].


Login

System and Communications Protection (SC)

Level N/A

Maintain a separate execution domain for each executing system process.


Login

System and Communications Protection (SC)

Implement hardware separation mechanisms to facilitate process isolation.


Login

System and Communications Protection (SC)

Maintain a separate execution domain for each thread in [Assignment: organization-defined multi-threaded processing].


Login