System and Communications Protection (SC)

Implement anti-spoofing mechanisms to prevent adversaries from falsifying the security attributes indicating the successful application of the security process.


Login

System and Communications Protection (SC)

Implement [Assignment: organization-defined mechanisms or techniques] to bind security and privacy attributes to transmitted information.


Login

System and Communications Protection (SC)

a. Issue public key certificates under an [Assignment: organization-defined certificate policy] or obtain public key certificates from an approved service provider; and b. Include only approved trust anchors in trust stores or certificate stores managed by the organization.


Login

System and Communications Protection (SC)

Level N/A

a. Define acceptable and unacceptable mobile code and mobile code technologies; and b. Authorize, monitor, and control the use of mobile code within the system.


Login

System and Communications Protection (SC)

Identify [Assignment: organization-defined unacceptable mobile code] and take [Assignment: organization-defined corrective actions].


Login

System and Communications Protection (SC)

Verify that the acquisition, development, and use of mobile code to be deployed in the system meets [Assignment: organization-defined mobile code requirements].


Login

System and Communications Protection (SC)

Prevent the download and execution of [Assignment: organization-defined unacceptable mobile code].


Login

System and Communications Protection (SC)

Prevent the automatic execution of mobile code in [Assignment: organization-defined software applications] and enforce [Assignment: organization-defined actions] prior to executing the code.


Login

System and Communications Protection (SC)

Allow execution of permitted mobile code only in confined virtual machine environments.


Login

System and Communications Protection (SC)

[Withdrawn: Incorporated into SC-35.]


Login