National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

NIST Special Publication 800-53 (Rev. 4)

Security Controls and Assessment Procedures for Federal Information Systems and Organizations

System And Communications Protection Control Family

Showing 44 controls:
No. Control Priority Low Moderate High
SC-1 SYSTEM AND COMMUNICATIONS PROTECTION POLICY AND PROCEDURES P1 SC-1 SC-1 SC-1
SC-2 APPLICATION PARTITIONING P1 SC-2 SC-2
SC-3 SECURITY FUNCTION ISOLATION P1 SC-3
SC-4 INFORMATION IN SHARED RESOURCES P1 SC-4 SC-4
SC-5 DENIAL OF SERVICE PROTECTION P1 SC-5 SC-5 SC-5
SC-6 RESOURCE AVAILABILITY P0
SC-7 BOUNDARY PROTECTION P1 SC-7 SC-7 (3) (4) (5) (7) SC-7 (3) (4) (5) (7) (8) (18) (21)
SC-8 TRANSMISSION CONFIDENTIALITY AND INTEGRITY P1 SC-8 (1) SC-8 (1)
SC-9 TRANSMISSION CONFIDENTIALITY
SC-10 NETWORK DISCONNECT P2 SC-10 SC-10
SC-11 TRUSTED PATH P0
SC-12 CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT P1 SC-12 SC-12 SC-12 (1)
SC-13 CRYPTOGRAPHIC PROTECTION P1 SC-13 SC-13 SC-13
SC-14 PUBLIC ACCESS PROTECTIONS
SC-15 COLLABORATIVE COMPUTING DEVICES P1 SC-15 SC-15 SC-15
SC-16 TRANSMISSION OF SECURITY ATTRIBUTES P0
SC-17 PUBLIC KEY INFRASTRUCTURE CERTIFICATES P1 SC-17 SC-17
SC-18 MOBILE CODE P2 SC-18 SC-18
SC-19 VOICE OVER INTERNET PROTOCOL P1 SC-19 SC-19
SC-20 SECURE NAME / ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE) P1 SC-20 SC-20 SC-20
SC-21 SECURE NAME / ADDRESS RESOLUTION SERVICE (RECURSIVE OR CACHING RESOLVER) P1 SC-21 SC-21 SC-21
SC-22 ARCHITECTURE AND PROVISIONING FOR NAME / ADDRESS RESOLUTION SERVICE P1 SC-22 SC-22 SC-22
SC-23 SESSION AUTHENTICITY P1 SC-23 SC-23
SC-24 FAIL IN KNOWN STATE P1 SC-24
SC-25 THIN NODES P0
SC-26 HONEYPOTS P0
SC-27 PLATFORM-INDEPENDENT APPLICATIONS P0
SC-28 PROTECTION OF INFORMATION AT REST P1 SC-28 SC-28
SC-29 HETEROGENEITY P0
SC-30 CONCEALMENT AND MISDIRECTION P0
SC-31 COVERT CHANNEL ANALYSIS P0
SC-32 INFORMATION SYSTEM PARTITIONING P0
SC-33 TRANSMISSION PREPARATION INTEGRITY
SC-34 NON-MODIFIABLE EXECUTABLE PROGRAMS P0
SC-35 HONEYCLIENTS P0
SC-36 DISTRIBUTED PROCESSING AND STORAGE P0
SC-37 OUT-OF-BAND CHANNELS P0
SC-38 OPERATIONS SECURITY P0
SC-39 PROCESS ISOLATION P1 SC-39 SC-39 SC-39
SC-40 WIRELESS LINK PROTECTION P0
SC-41 PORT AND I/O DEVICE ACCESS P0
SC-42 SENSOR CAPABILITY AND DATA P0
SC-43 USAGE RESTRICTIONS P0
SC-44 DETONATION CHAMBERS P0