Network Security

Automated mechanisms exist to enforce information flow control using security policy filters as a basis for flow control decisions.


Login

Network Security

Automated mechanisms exist to utilize data type identifiers to validate data essential for information flow decisions when transferring information between different security domains.


Login

Network Security

Automated mechanisms exist to decompose information into policy-relevant subcomponents for submission to policy enforcement mechanisms, when transferring information between different security domains.


Login

Network Security

Automated mechanisms exist to implement security policy filters requiring fully enumerated formats that restrict data structure and content, when transferring information between different security domains.


Login

Network Security

Level N/A

Automated mechanisms exist to examine information for the presence of unsanctioned information and prohibits the transfer of such information, when transferring information between different security domains.


Login

Network Security

Automated mechanisms exist to uniquely identify and authenticate source and destination points for information transfer.


Login

Network Security

Automated mechanisms exist to apply cybersecurity and/or data privacy filters on metadata.


Login

Network Security

Mechanisms exist to authorize connections from systems to other systems using Interconnection Security Agreements (ISAs) that document, for each interconnection, the interface characteristics, cybersecurity & data privacy requirements and the nature of the information communicated.


Login

Network Security

Mechanisms exist to prohibit the direct connection of a sensitive system to an external network without the use of an organization-defined boundary protection device.


Login

Network Security

Mechanisms exist to control internal system connections through authorizing internal connections of systems and documenting, for each internal connection, the interface characteristics, security requirements and the nature of the information communicated.


Login