System and Communications Protection (SC)

Protect the [Selection (one or more): confidentiality; integrity] of transmitted information.


Login

System and Communications Protection (SC)

Implement cryptographic mechanisms to [Selection (one or more): prevent unauthorized disclosure of information; detect changes to information] during transmission.


Login

System and Communications Protection (SC)

Maintain the [Selection (one or more): confidentiality; integrity] of information during preparation for transmission and during reception.


Login

System and Communications Protection (SC)

Implement cryptographic mechanisms to protect message externals unless otherwise protected by [Assignment: organization-defined alternative physical controls].


Login

System and Communications Protection (SC)

Implement cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by [Assignment: organization-defined alternative physical controls].


Login

System and Communications Protection (SC)

Implement [Assignment: organization-defined protected distribution system] to [Selection (one or more): prevent unauthorized disclosure of information; detect changes to information] during transmission.


Login

System and Communications Protection (SC)

[Withdrawn: Incorporated into SC-13.]


Login

System and Communications Protection (SC)

Level N/A

Terminate the network connection associated with a communications session at the end of the session or after [Assignment: organization-defined time period] of inactivity.


Login

System and Communications Protection (SC)

Level N/A

a. Provide a [Selection: physically; logically] isolated trusted communications path for communications between the user and the trusted components of the system; and b. Permit users to invoke the trusted communications path for communications between the user and the following security functions of the system, including at a minimum, authentication and re-authentication: [Assignment: organization-defined security functions].


Login

System and Communications Protection (SC)

(a) Provide a trusted communications path that is irrefutably distinguishable from other communications paths; and (b) Initiate the trusted communications path for communications between the [Assignment: organization-defined security functions] of the system and the user.


Login