NIST Special Publication 800-53 (Rev. 4)
Security and Privacy Controls for Federal Information Systems and Organizations
A honeypot is set up as a decoy to attract adversaries and to deflect their attacks away from the operational systems supporting organizational missions/business function. Depending upon the specific usage of the honeypot, consultation with the Office of the General Counsel before deployment may be needed.
Related to: SC-30, SC-44, SI-3, SI-4
HONEYPOTS | DETECTION OF MALICIOUS CODE
[Withdrawn: Incorporated into SC-35].