NIST Special Publication 800-53 (Rev. 4)

Security and Privacy Controls for Federal Information Systems and Organizations

SC-39 PROCESS ISOLATION

Family:
System and Communications Protection
Class:
Priority:
P1 - Implement P1 security controls first.
Baseline Allocation:
Low Moderate High
SC-39
SC-39
SC-39

Control Description

The information system maintains a separate execution domain for each executing process.

Supplemental Guidance

Information systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each information system process has a distinct address space so that communication between processes is performed in a manner controlled through the security functions, and one process cannot modify the executing code of another process. Maintaining separate execution domains for executing processes can be achieved, for example, by implementing separate address spaces. This capability is available in most commercial operating systems that employ multi-state processor technologies.

Related to: AC-3AC-4AC-6SA-4SA-5SA-8SC-2SC-3

Control Enhancements

SC-39 (1) PROCESS ISOLATION | HARDWARE SEPARATION
The information system implements underlying hardware separation mechanisms to facilitate process separation.
Supplemental Guidance: Hardware-based separation of information system processes is generally less susceptible to compromise than software-based separation, thus providing greater assurance that the separation will be enforced. Underlying hardware separation mechanisms include, for example, hardware memory management.
SC-39 (2) PROCESS ISOLATION | THREAD ISOLATION
The information system maintains a separate execution domain for each thread in [Assignment: organization-defined multi-threaded processing].

References

None.