System and Communications Protection (SC)

(a) Prevent the exfiltration of information; and (b) Conduct exfiltration tests [Assignment: organization-defined frequency].


Login

System and Communications Protection (SC)

Only allow incoming communications from [Assignment: organization-defined authorized sources] to be routed to [Assignment: organization-defined authorized destinations].


Login

System and Communications Protection (SC)

Implement [Assignment: organization-defined host-based boundary protection mechanisms] at [Assignment: organization-defined system components].


Login

System and Communications Protection (SC)

Isolate [Assignment: organization-defined information security tools, mechanisms, and support components] from other internal system components by implementing physically separate subnetworks with managed interfaces to other components of the system.


Login

System and Communications Protection (SC)

Protect against unauthorized physical connections at [Assignment: organization-defined managed interfaces].


Login

System and Communications Protection (SC)

Route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing.


Login

System and Communications Protection (SC)

Prevent the discovery of specific system components that represent a managed interface.


Login

System and Communications Protection (SC)

Enforce adherence to protocol formats.


Login

System and Communications Protection (SC)

Prevent systems from entering unsecure states in the event of an operational failure of a boundary protection device.


Login

System and Communications Protection (SC)

Block inbound and outbound communications traffic between [Assignment: organization-defined communication clients] that are independently configured by end users and external service providers.


Login