System and Services Acquisition (SA)

[Withdrawn: Incorporated into CM-11 and SI-7.]


Login

System and Services Acquisition (SA)

Level N/A

Employ [Selection (one or more): design; modification; augmentation; reconfiguration] on [Assignment: organization-defined systems or system components] supporting mission essential services or functions to increase the trustworthiness in those systems or components.


Login

System and Communications Protection (SC)

a. Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]: 1. [Selection (one or more): Organization-level; Mission/business process-level; System-level] system and communications protection policy that: (a) Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and 2. Procedures to facilitate the implementation of the system and communications protection policy and the associated system and communications protection controls; b. Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the system and communications protection policy and procedures; and c. Review and update the current system and communications protection: 1. Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and 2. Procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].


Login

System and Communications Protection (SC)

Separate user functionality, including user interface services, from system management functionality.


Login

System and Communications Protection (SC)

Prevent the presentation of system management functionality at interfaces to non-privileged users.


Login

System and Communications Protection (SC)

Store state information from applications and software separately.


Login

System and Communications Protection (SC)

Isolate security functions from nonsecurity functions.


Login

System and Communications Protection (SC)

Employ hardware separation mechanisms to implement security function isolation.


Login

System and Communications Protection (SC)

Isolate security functions enforcing access and information flow control from nonsecurity functions and from other security functions.


Login

System and Communications Protection (SC)

Minimize the number of nonsecurity functions included within the isolation boundary containing security functions.


Login