National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

NIST Special Publication 800-53 (Rev. 4)

Security and Privacy Controls for Federal Information Systems and Organizations

SC-35 HONEYCLIENTS

Family:
SC - SYSTEM AND COMMUNICATIONS PROTECTION
Class:
Priority:
P0 - Unspecified priority.
Baseline Allocation:
Low Moderate High
N/A N/A N/A

Control Description

The information system includes components that proactively seek to identify malicious websites and/or web-based malicious code.

Supplemental Guidance

Honeyclients differ from honeypots in that the components actively probe the Internet in search of malicious code (e.g., worms) contained on external websites. As with honeypots, honeyclients require some supporting isolation measures (e.g., virtualization) to ensure that any malicious code discovered during the search and subsequently executed does not infect organizational information systems.

Related to: SC-26SC-44SI-3SI-4

Control Enhancements

None.

References

None.