NIST SP 800-53 r4 - Security Control Family: System and Communications Protection - Supplemental Controls, v4
Profile of requirements corresponding to all supplemental security controls in NIST Special Publication 800-53, r4, under the control family of System and Communications Protection.

Trust Expression:
TIP_NISTSP80053r4SecurityControlSC21InterfacesforNonPrivilegedUsers and TIP_NISTSP80053r4SecurityControlSC31HardwareSeparation and TIP_NISTSP80053r4SecurityControlSC32AccessFlowControlFunctions and TIP_NISTSP80053r4SecurityControlSC33MinimizeNonsecurityFunctionality and TIP_NISTSP80053r4SecurityControlSC34ModuleCouplingandCohesiveness and TIP_NISTSP80053r4SecurityControlSC35LayeredStructures and TIP_NISTSP80053r4SecurityControlSC42PeriodsProcessing and TIP_NISTSP80053r4SecurityControlSC51RestrictInternalUsers and TIP_NISTSP80053r4SecurityControlSC52ExcessCapacityBandwidthRedundancy and TIP_NISTSP80053r4SecurityControlSC53DetectionMonitoring and TIP_NISTSP80053r4SecurityControlSC6ResourceAvailability and TIP_NISTSP80053r4SecurityControlSC79RestrictThreateningOutgoingCommunicationsTraffic and TIP_NISTSP80053r4SecurityControlSC710PreventUnauthorizedExfiltration and TIP_NISTSP80053r4SecurityControlSC711RestrictIncomingCommunicationsTraffic and TIP_NISTSP80053r4SecurityControlSC712HostBasedProtection and TIP_NISTSP80053r4SecurityControlSC713IsolationofSecurityToolsMechanismsSupportComponents and TIP_NISTSP80053r4SecurityControlSC714ProtectsAgainstUnauthorizedPhysicalConnections and TIP_NISTSP80053r4SecurityControlSC715RoutePrivilegedNetworkAccesses and TIP_NISTSP80053r4SecurityControlSC716PreventDiscoveryofComponentsDevices and TIP_NISTSP80053r4SecurityControlSC717AutomatedEnforcementofProtocolFormats and TIP_NISTSP80053r4SecurityControlSC719BlocksCommunicationfromNonOrganizationallyConfiguredHosts and TIP_NISTSP80053r4SecurityControlSC720DynamicIsolationSegregation and TIP_NISTSP80053r4SecurityControlSC722SeparateSubnetsforConnectingtoDifferentSecurityDomains and TIP_NISTSP80053r4SecurityControlSC723DisableSenderFeedbackonProtocolValidationFailure and TIP_NISTSP80053r4SecurityControlSC82PrePostTransmissionHandling and TIP_NISTSP80053r4SecurityControlSC83CryptographicProtectionforMessageExternals and TIP_NISTSP80053r4SecurityControlSC84ConcealRandomizeCommunications and TIP_NISTSP80053r4SecurityControlSC11TrustedPath and TIP_NISTSP80053r4SecurityControlSC111LogicalIsolation and TIP_NISTSP80053r4SecurityControlSC122SymmetricKeys and TIP_NISTSP80053r4SecurityControlSC123AsymmetricKeys and TIP_NISTSP80053r4SecurityControlSC151PhysicalDisconnect and TIP_NISTSP80053r4SecurityControlSC153DisablingRemovalinSecureWorkAreas and TIP_NISTSP80053r4SecurityControlSC154ExplicitlyIndicateCurrentParticipants and TIP_NISTSP80053r4SecurityControlSC16TransmissionofSecurityAttributes and TIP_NISTSP80053r4SecurityControlSC161IntegrityValidation and TIP_NISTSP80053r4SecurityControlSC181IdentifyUnacceptableCodeTakeCorrectiveActions and TIP_NISTSP80053r4SecurityControlSC182AcquisitionDevelopmentUse and TIP_NISTSP80053r4SecurityControlSC183PreventDownloadingExecution and TIP_NISTSP80053r4SecurityControlSC184PreventAutomaticExecution and TIP_NISTSP80053r4SecurityControlSC185AllowExecutionOnlyinConfinedEnvironments and TIP_NISTSP80053r4SecurityControlSC202DataOriginIntegrity and TIP_NISTSP80053r4SecurityControlSC231InvalidateSessionIdentifiersatLogout and TIP_NISTSP80053r4SecurityControlSC233UniqueSessionIdentifierswithRandomization and TIP_NISTSP80053r4SecurityControlSC235AllowedCertificateAuthorities and TIP_NISTSP80053r4SecurityControlSC25ThinNodes and TIP_NISTSP80053r4SecurityControlSC26Honeypots and TIP_NISTSP80053r4SecurityControlSC27PlatformIndependentApplications and TIP_NISTSP80053r4SecurityControlSC281CryptographicProtection and TIP_NISTSP80053r4SecurityControlSC282OffLineStorage and TIP_NISTSP80053r4SecurityControlSC29Heterogeneity and TIP_NISTSP80053r4SecurityControlSC291VirtualizationTechniques and TIP_NISTSP80053r4SecurityControlSC30ConcealmentandMisdirection and TIP_NISTSP80053r4SecurityControlSC302Randomness and TIP_NISTSP80053r4SecurityControlSC303ChangeProcessingStorageLocations and TIP_NISTSP80053r4SecurityControlSC304MisleadingInformation and TIP_NISTSP80053r4SecurityControlSC305ConcealmentofSystemComponents and TIP_NISTSP80053r4SecurityControlSC31CovertChannelAnalysis and TIP_NISTSP80053r4SecurityControlSC311TestCovertChannelsforExploitability and TIP_NISTSP80053r4SecurityControlSC312MaximumBandwidth and TIP_NISTSP80053r4SecurityControlSC313MeasureBandwidthinOperationalEnvironments and TIP_NISTSP80053r4SecurityControlSC32InformationSystemPartitioning and TIP_NISTSP80053r4SecurityControlSC34NonModifiableExecutablePrograms and TIP_NISTSP80053r4SecurityControlSC341NoWritableStorage and TIP_NISTSP80053r4SecurityControlSC342IntegrityProtectionReadOnlyMedia and TIP_NISTSP80053r4SecurityControlSC343HardwareBasedProtection and TIP_NISTSP80053r4SecurityControlSC35Honeyclients and TIP_NISTSP80053r4SecurityControlSC36DistributedProcessingandStorage and TIP_NISTSP80053r4SecurityControlSC361PollingTechniques and TIP_NISTSP80053r4SecurityControlSC37OutOfBandChannels and TIP_NISTSP80053r4SecurityControlSC371EnsureDeliveryTransmission and TIP_NISTSP80053r4SecurityControlSC38OperationsSecurity and TIP_NISTSP80053r4SecurityControlSC391HardwareSeparation and TIP_NISTSP80053r4SecurityControlSC392ThreadIsolation and TIP_NISTSP80053r4SecurityControlSC40WirelessLinkProtection and TIP_NISTSP80053r4SecurityControlSC401ElectromagneticInterference and TIP_NISTSP80053r4SecurityControlSC402ReduceDetectionPotential and TIP_NISTSP80053r4SecurityControlSC403ImitativeorManipulativeCommunicationsDeception and TIP_NISTSP80053r4SecurityControlSC404SignalParameterIdentification and TIP_NISTSP80053r4SecurityControlSC41PortandIODeviceAccess and TIP_NISTSP80053r4SecurityControlSC42SensorCapabilityandData and TIP_NISTSP80053r4SecurityControlSC421ReportingtoAuthorizedIndividualsorRoles and TIP_NISTSP80053r4SecurityControlSC422AuthorizedUse and TIP_NISTSP80053r4SecurityControlSC423ProhibitUseofDevices and TIP_NISTSP80053r4SecurityControlSC43UsageRestrictions and TIP_NISTSP80053r4SecurityControlSC44DetonationChambers
References (86)
TIP NIST SP 800-53 r4 Security Control SC-2 (1): Interfaces for Non-Privileged Users, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-2 (1): Interfaces for Non-Privileged Users. |
ID | TIP_NISTSP80053r4SecurityControlSC21InterfacesforNonPrivilegedUsers |
TIP NIST SP 800-53 r4 Security Control SC-3 (1): Hardware Separation, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (1): Hardware Separation. |
ID | TIP_NISTSP80053r4SecurityControlSC31HardwareSeparation |
TIP NIST SP 800-53 r4 Security Control SC-3 (2): Access / Flow Control Functions, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (2): Access / Flow Control Functions. |
ID | TIP_NISTSP80053r4SecurityControlSC32AccessFlowControlFunctions |
TIP NIST SP 800-53 r4 Security Control SC-3 (3): Minimize Nonsecurity Functionality, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (3): Minimize Nonsecurity Functionality. |
ID | TIP_NISTSP80053r4SecurityControlSC33MinimizeNonsecurityFunctionality |
TIP NIST SP 800-53 r4 Security Control SC-3 (4): Module Coupling and Cohesiveness, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (4): Module Coupling and Cohesiveness. |
ID | TIP_NISTSP80053r4SecurityControlSC34ModuleCouplingandCohesiveness |
TIP NIST SP 800-53 r4 Security Control SC-3 (5): Layered Structures, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (5): Layered Structures. |
ID | TIP_NISTSP80053r4SecurityControlSC35LayeredStructures |
TIP NIST SP 800-53 r4 Security Control SC-4 (2): Periods Processing, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-4 (2): Periods Processing. |
ID | TIP_NISTSP80053r4SecurityControlSC42PeriodsProcessing |
TIP NIST SP 800-53 r4 Security Control SC-5 (1): Restrict Internal Users, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-5 (1): Restrict Internal Users. |
ID | TIP_NISTSP80053r4SecurityControlSC51RestrictInternalUsers |
TIP NIST SP 800-53 r4 Security Control SC-5 (2): Excess Capacity / Bandwidth / Redundancy, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-5 (2): Excess Capacity / Bandwidth / Redundancy. |
ID | TIP_NISTSP80053r4SecurityControlSC52ExcessCapacityBandwidthRedundancy |
TIP NIST SP 800-53 r4 Security Control SC-5 (3): Detection / Monitoring, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-5 (3): Detection / Monitoring. |
ID | TIP_NISTSP80053r4SecurityControlSC53DetectionMonitoring |
TIP NIST SP 800-53 r4 Security Control SC-6: Resource Availability, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-6: Resource Availability. |
ID | TIP_NISTSP80053r4SecurityControlSC6ResourceAvailability |
TIP NIST SP 800-53 r4 Security Control SC-7 (9): Restrict Threatening Outgoing Communications Traffic, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (9): Restrict Threatening Outgoing Communications Traffic. |
ID | TIP_NISTSP80053r4SecurityControlSC79RestrictThreateningOutgoingCommunicationsTraffic |
TIP NIST SP 800-53 r4 Security Control SC-7 (10): Prevent Unauthorized Exfiltration, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (10): Prevent Unauthorized Exfiltration. |
ID | TIP_NISTSP80053r4SecurityControlSC710PreventUnauthorizedExfiltration |
TIP NIST SP 800-53 r4 Security Control SC-7 (11): Restrict Incoming Communications Traffic, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (11): Restrict Incoming Communications Traffic. |
ID | TIP_NISTSP80053r4SecurityControlSC711RestrictIncomingCommunicationsTraffic |
TIP NIST SP 800-53 r4 Security Control SC-7 (12): Host-Based Protection, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (12): Host-Based Protection. |
ID | TIP_NISTSP80053r4SecurityControlSC712HostBasedProtection |
TIP NIST SP 800-53 r4 Security Control SC-7 (13): Isolation of Security Tools / Mechanisms / Support Components, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (13): Isolation of Security Tools / Mechanisms / Support Components. |
ID | TIP_NISTSP80053r4SecurityControlSC713IsolationofSecurityToolsMechanismsSupportComponents |
TIP NIST SP 800-53 r4 Security Control SC-7 (14): Protects Against Unauthorized Physical Connections, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (14): Protects Against Unauthorized Physical Connections. |
ID | TIP_NISTSP80053r4SecurityControlSC714ProtectsAgainstUnauthorizedPhysicalConnections |
TIP NIST SP 800-53 r4 Security Control SC-7 (15): Route Privileged Network Accesses, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (15): Route Privileged Network Accesses. |
ID | TIP_NISTSP80053r4SecurityControlSC715RoutePrivilegedNetworkAccesses |
TIP NIST SP 800-53 r4 Security Control SC-7 (16): Prevent Discovery of Components / Devices, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (16): Prevent Discovery of Components / Devices. |
ID | TIP_NISTSP80053r4SecurityControlSC716PreventDiscoveryofComponentsDevices |
TIP NIST SP 800-53 r4 Security Control SC-7 (17): Automated Enforcement of Protocol Formats, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (17): Automated Enforcement of Protocol Formats. |
ID | TIP_NISTSP80053r4SecurityControlSC717AutomatedEnforcementofProtocolFormats |
TIP NIST SP 800-53 r4 Security Control SC-7 (19): Blocks Communication from Non-Organizationally Configured Hosts, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (19): Blocks Communication from Non-Organizationally Configured Hosts. |
ID | TIP_NISTSP80053r4SecurityControlSC719BlocksCommunicationfromNonOrganizationallyConfiguredHosts |
TIP NIST SP 800-53 r4 Security Control SC-7 (20): Dynamic Isolation / Segregation, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (20): Dynamic Isolation / Segregation. |
ID | TIP_NISTSP80053r4SecurityControlSC720DynamicIsolationSegregation |
TIP NIST SP 800-53 r4 Security Control SC-7 (22): Separate Subnets for Connecting to Different Security Domains, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (22): Separate Subnets for Connecting to Different Security Domains. |
ID | TIP_NISTSP80053r4SecurityControlSC722SeparateSubnetsforConnectingtoDifferentSecurityDomains |
TIP NIST SP 800-53 r4 Security Control SC-7 (23): Disable Sender Feedback on Protocol Validation Failure, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (23): Disable Sender Feedback on Protocol Validation Failure. |
ID | TIP_NISTSP80053r4SecurityControlSC723DisableSenderFeedbackonProtocolValidationFailure |
TIP NIST SP 800-53 r4 Security Control SC-8 (2): Pre / Post Transmission Handling, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-8 (2): Pre / Post Transmission Handling. |
ID | TIP_NISTSP80053r4SecurityControlSC82PrePostTransmissionHandling |
TIP NIST SP 800-53 r4 Security Control SC-8 (3): Cryptographic Protection for Message Externals, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-8 (3): Cryptographic Protection for Message Externals. |
ID | TIP_NISTSP80053r4SecurityControlSC83CryptographicProtectionforMessageExternals |
TIP NIST SP 800-53 r4 Security Control SC-8 (4): Conceal / Randomize Communications, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-8 (4): Conceal / Randomize Communications. |
ID | TIP_NISTSP80053r4SecurityControlSC84ConcealRandomizeCommunications |
TIP NIST SP 800-53 r4 Security Control SC-11: Trusted Path, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-11: Trusted Path. |
ID | TIP_NISTSP80053r4SecurityControlSC11TrustedPath |
TIP NIST SP 800-53 r4 Security Control SC-11 (1): Logical Isolation, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-11 (1): Logical Isolation. |
ID | TIP_NISTSP80053r4SecurityControlSC111LogicalIsolation |
TIP NIST SP 800-53 r4 Security Control SC-12 (2): Symmetric Keys, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12 (2): Symmetric Keys. |
ID | TIP_NISTSP80053r4SecurityControlSC122SymmetricKeys |
TIP NIST SP 800-53 r4 Security Control SC-12 (3): Asymmetric Keys, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12 (3): Asymmetric Keys. |
ID | TIP_NISTSP80053r4SecurityControlSC123AsymmetricKeys |
TIP NIST SP 800-53 r4 Security Control SC-15 (1): Physical Disconnect, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (1): Physical Disconnect. |
ID | TIP_NISTSP80053r4SecurityControlSC151PhysicalDisconnect |
TIP NIST SP 800-53 r4 Security Control SC-15 (3): Disabling / Removal in Secure Work Areas, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (3): Disabling / Removal in Secure Work Areas. |
ID | TIP_NISTSP80053r4SecurityControlSC153DisablingRemovalinSecureWorkAreas |
TIP NIST SP 800-53 r4 Security Control SC-15 (4): Explicitly Indicate Current Participants, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (4): Explicitly Indicate Current Participants. |
ID | TIP_NISTSP80053r4SecurityControlSC154ExplicitlyIndicateCurrentParticipants |
TIP NIST SP 800-53 r4 Security Control SC-16: Transmission of Security Attributes, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-16: Transmission of Security Attributes. |
ID | TIP_NISTSP80053r4SecurityControlSC16TransmissionofSecurityAttributes |
TIP NIST SP 800-53 r4 Security Control SC-16 (1): Integrity Validation, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-16 (1): Integrity Validation. |
ID | TIP_NISTSP80053r4SecurityControlSC161IntegrityValidation |
TIP NIST SP 800-53 r4 Security Control SC-18 (1): Identify Unacceptable Code / Take Corrective Actions, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (1): Identify Unacceptable Code / Take Corrective Actions. |
ID | TIP_NISTSP80053r4SecurityControlSC181IdentifyUnacceptableCodeTakeCorrectiveActions |
TIP NIST SP 800-53 r4 Security Control SC-18 (2): Acquisition / Development / Use, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (2): Acquisition / Development / Use. |
ID | TIP_NISTSP80053r4SecurityControlSC182AcquisitionDevelopmentUse |
TIP NIST SP 800-53 r4 Security Control SC-18 (3): Prevent Downloading / Execution, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (3): Prevent Downloading / Execution. |
ID | TIP_NISTSP80053r4SecurityControlSC183PreventDownloadingExecution |
TIP NIST SP 800-53 r4 Security Control SC-18 (4): Prevent Automatic Execution, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (4): Prevent Automatic Execution. |
ID | TIP_NISTSP80053r4SecurityControlSC184PreventAutomaticExecution |
TIP NIST SP 800-53 r4 Security Control SC-18 (5): Allow Execution Only in Confined Environments, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (5): Allow Execution Only in Confined Environments. |
ID | TIP_NISTSP80053r4SecurityControlSC185AllowExecutionOnlyinConfinedEnvironments |
TIP NIST SP 800-53 r4 Security Control SC-20 (2): Data Origin / Integrity, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-20 (2): Data Origin / Integrity. |
ID | TIP_NISTSP80053r4SecurityControlSC202DataOriginIntegrity |
TIP NIST SP 800-53 r4 Security Control SC-23 (1): Invalidate Session Identifiers at Logout, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (1): Invalidate Session Identifiers at Logout. |
ID | TIP_NISTSP80053r4SecurityControlSC231InvalidateSessionIdentifiersatLogout |
TIP NIST SP 800-53 r4 Security Control SC-23 (3): Unique Session Identifiers with Randomization, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (3): Unique Session Identifiers with Randomization. |
ID | TIP_NISTSP80053r4SecurityControlSC233UniqueSessionIdentifierswithRandomization |
TIP NIST SP 800-53 r4 Security Control SC-23 (5): Allowed Certificate Authorities, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (5): Allowed Certificate Authorities. |
ID | TIP_NISTSP80053r4SecurityControlSC235AllowedCertificateAuthorities |
TIP NIST SP 800-53 r4 Security Control SC-25: Thin Nodes, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-25: Thin Nodes. |
ID | TIP_NISTSP80053r4SecurityControlSC25ThinNodes |
TIP NIST SP 800-53 r4 Security Control SC-26: Honeypots, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-26: Honeypots. |
ID | TIP_NISTSP80053r4SecurityControlSC26Honeypots |
TIP NIST SP 800-53 r4 Security Control SC-27: Platform-Independent Applications, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-27: Platform-Independent Applications. |
ID | TIP_NISTSP80053r4SecurityControlSC27PlatformIndependentApplications |
TIP NIST SP 800-53 r4 Security Control SC-28 (1): Cryptographic Protection, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-28 (1): Cryptographic Protection. |
ID | TIP_NISTSP80053r4SecurityControlSC281CryptographicProtection |
TIP NIST SP 800-53 r4 Security Control SC-28 (2): Off-Line Storage, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-28 (2): Off-Line Storage. |
ID | TIP_NISTSP80053r4SecurityControlSC282OffLineStorage |
TIP NIST SP 800-53 r4 Security Control SC-29: Heterogeneity, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-29: Heterogeneity. |
ID | TIP_NISTSP80053r4SecurityControlSC29Heterogeneity |
TIP NIST SP 800-53 r4 Security Control SC-29 (1): Virtualization Techniques, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-29 (1): Virtualization Techniques. |
ID | TIP_NISTSP80053r4SecurityControlSC291VirtualizationTechniques |
TIP NIST SP 800-53 r4 Security Control SC-30: Concealment and Misdirection, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30: Concealment and Misdirection. |
ID | TIP_NISTSP80053r4SecurityControlSC30ConcealmentandMisdirection |
TIP NIST SP 800-53 r4 Security Control SC-30 (2): Randomness, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (2): Randomness. |
ID | TIP_NISTSP80053r4SecurityControlSC302Randomness |
TIP NIST SP 800-53 r4 Security Control SC-30 (3): Change Processing / Storage Locations, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (3): Change Processing / Storage Locations. |
ID | TIP_NISTSP80053r4SecurityControlSC303ChangeProcessingStorageLocations |
TIP NIST SP 800-53 r4 Security Control SC-30 (4): Misleading Information, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (4): Misleading Information. |
ID | TIP_NISTSP80053r4SecurityControlSC304MisleadingInformation |
TIP NIST SP 800-53 r4 Security Control SC-30 (5): Concealment of System Components, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (5): Concealment of System Components. |
ID | TIP_NISTSP80053r4SecurityControlSC305ConcealmentofSystemComponents |
TIP NIST SP 800-53 r4 Security Control SC-31: Covert Channel Analysis, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31: Covert Channel Analysis. |
ID | TIP_NISTSP80053r4SecurityControlSC31CovertChannelAnalysis |
TIP NIST SP 800-53 r4 Security Control SC-31 (1): Test Covert Channels for Exploitability, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (1): Test Covert Channels for Exploitability. |
ID | TIP_NISTSP80053r4SecurityControlSC311TestCovertChannelsforExploitability |
TIP NIST SP 800-53 r4 Security Control SC-31 (2): Maximum Bandwidth, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (2): Maximum Bandwidth. |
ID | TIP_NISTSP80053r4SecurityControlSC312MaximumBandwidth |
TIP NIST SP 800-53 r4 Security Control SC-31 (3): Measure Bandwidth in Operational Environments, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (3): Measure Bandwidth in Operational Environments. |
ID | TIP_NISTSP80053r4SecurityControlSC313MeasureBandwidthinOperationalEnvironments |
TIP NIST SP 800-53 r4 Security Control SC-32: Information System Partitioning, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-32: Information System Partitioning. |
ID | TIP_NISTSP80053r4SecurityControlSC32InformationSystemPartitioning |
TIP NIST SP 800-53 r4 Security Control SC-34: Non-Modifiable Executable Programs, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34: Non-Modifiable Executable Programs. |
ID | TIP_NISTSP80053r4SecurityControlSC34NonModifiableExecutablePrograms |
TIP NIST SP 800-53 r4 Security Control SC-34 (1): No Writable Storage, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (1): No Writable Storage. |
ID | TIP_NISTSP80053r4SecurityControlSC341NoWritableStorage |
TIP NIST SP 800-53 r4 Security Control SC-34 (2): Integrity Protection / Read-Only Media, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (2): Integrity Protection / Read-Only Media. |
ID | TIP_NISTSP80053r4SecurityControlSC342IntegrityProtectionReadOnlyMedia |
TIP NIST SP 800-53 r4 Security Control SC-34 (3): Hardware-Based Protection, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (3): Hardware-Based Protection. |
ID | TIP_NISTSP80053r4SecurityControlSC343HardwareBasedProtection |
TIP NIST SP 800-53 r4 Security Control SC-35: Honeyclients, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-35: Honeyclients. |
ID | TIP_NISTSP80053r4SecurityControlSC35Honeyclients |
TIP NIST SP 800-53 r4 Security Control SC-36: Distributed Processing and Storage, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-36: Distributed Processing and Storage. |
ID | TIP_NISTSP80053r4SecurityControlSC36DistributedProcessingandStorage |
TIP NIST SP 800-53 r4 Security Control SC-36 (1): Polling Techniques, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-36 (1): Polling Techniques. |
ID | TIP_NISTSP80053r4SecurityControlSC361PollingTechniques |
TIP NIST SP 800-53 r4 Security Control SC-37: Out-Of-Band Channels, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-37: Out-Of-Band Channels. |
ID | TIP_NISTSP80053r4SecurityControlSC37OutOfBandChannels |
TIP NIST SP 800-53 r4 Security Control SC-37 (1): Ensure Delivery / Transmission, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-37 (1): Ensure Delivery / Transmission. |
ID | TIP_NISTSP80053r4SecurityControlSC371EnsureDeliveryTransmission |
TIP NIST SP 800-53 r4 Security Control SC-38: Operations Security, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-38: Operations Security. |
ID | TIP_NISTSP80053r4SecurityControlSC38OperationsSecurity |
TIP NIST SP 800-53 r4 Security Control SC-39 (1): Hardware Separation, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-39 (1): Hardware Separation. |
ID | TIP_NISTSP80053r4SecurityControlSC391HardwareSeparation |
TIP NIST SP 800-53 r4 Security Control SC-39 (2): Thread Isolation, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-39 (2): Thread Isolation. |
ID | TIP_NISTSP80053r4SecurityControlSC392ThreadIsolation |
TIP NIST SP 800-53 r4 Security Control SC-40: Wireless Link Protection, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40: Wireless Link Protection. |
ID | TIP_NISTSP80053r4SecurityControlSC40WirelessLinkProtection |
TIP NIST SP 800-53 r4 Security Control SC-40 (1): Electromagnetic Interference, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (1): Electromagnetic Interference. |
ID | TIP_NISTSP80053r4SecurityControlSC401ElectromagneticInterference |
TIP NIST SP 800-53 r4 Security Control SC-40 (2): Reduce Detection Potential, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (2): Reduce Detection Potential. |
ID | TIP_NISTSP80053r4SecurityControlSC402ReduceDetectionPotential |
TIP NIST SP 800-53 r4 Security Control SC-40 (3): Imitative or Manipulative Communications Deception, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (3): Imitative or Manipulative Communications Deception. |
ID | TIP_NISTSP80053r4SecurityControlSC403ImitativeorManipulativeCommunicationsDeception |
TIP NIST SP 800-53 r4 Security Control SC-40 (4): Signal Parameter Identification, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (4): Signal Parameter Identification. |
ID | TIP_NISTSP80053r4SecurityControlSC404SignalParameterIdentification |
TIP NIST SP 800-53 r4 Security Control SC-41: Port and I/O Device Access, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-41: Port and I/O Device Access. |
ID | TIP_NISTSP80053r4SecurityControlSC41PortandIODeviceAccess |
TIP NIST SP 800-53 r4 Security Control SC-42: Sensor Capability and Data, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42: Sensor Capability and Data. |
ID | TIP_NISTSP80053r4SecurityControlSC42SensorCapabilityandData |
TIP NIST SP 800-53 r4 Security Control SC-42 (1): Reporting to Authorized Individuals or Roles, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (1): Reporting to Authorized Individuals or Roles. |
ID | TIP_NISTSP80053r4SecurityControlSC421ReportingtoAuthorizedIndividualsorRoles |
TIP NIST SP 800-53 r4 Security Control SC-42 (2): Authorized Use, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (2): Authorized Use. |
ID | TIP_NISTSP80053r4SecurityControlSC422AuthorizedUse |
TIP NIST SP 800-53 r4 Security Control SC-42 (3): Prohibit Use of Devices, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (3): Prohibit Use of Devices. |
ID | TIP_NISTSP80053r4SecurityControlSC423ProhibitUseofDevices |
TIP NIST SP 800-53 r4 Security Control SC-43: Usage Restrictions, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-43: Usage Restrictions. |
ID | TIP_NISTSP80053r4SecurityControlSC43UsageRestrictions |
TIP NIST SP 800-53 r4 Security Control SC-44: Detonation Chambers, v4 | |
---|---|
Description | Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-44: Detonation Chambers. |
ID | TIP_NISTSP80053r4SecurityControlSC44DetonationChambers |
Sources (1)
SP800-53R4 | NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at http://dx.doi.org/10.6028/NIST.SP.800-53r4. |