Under active development Content is continuously updated and improved

SC-42Sensor Capability and Data

IL6

>Control Description

a

Prohibit [Selection (one or more): the use of devices possessing organization-defined environmental sensing capabilities in organization-defined facilities, areas, or systems; the remote activation of environmental sensing capabilities on organizational systems or system components with the following exceptions: organization-defined exceptions where remote activation of sensors is allowed]; and

b

Provide an explicit indication of sensor use to organization-defined group of users.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Sensor capability and data applies to types of systems or system components characterized as mobile devices, such as cellular telephones, smart phones, and tablets. Mobile devices often include sensors that can collect and record data regarding the environment where the system is in use. Sensors that are embedded within mobile devices include microphones, cameras, Global Positioning System (GPS) mechanisms, and accelerometers.

While the sensors on mobiles devices provide an important function, if activated covertly, such devices can potentially provide a means for adversaries to learn valuable information about individuals and organizations. For example, remotely activating the GPS function on a mobile device could provide an adversary with the ability to track the movements of an individual. Organizations may prohibit individuals from bringing cellular telephones or digital cameras into certain designated facilities or controlled areas within facilities where classified information is stored or sensitive conversations are taking place.

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What policies govern the implementation of sensor capability and data?
  • How are system and communications protection requirements defined and maintained?
  • Who is responsible for configuring and maintaining the security controls specified in SC-42?

Technical Implementation:

  • How is sensor capability and data technically implemented in your environment?
  • What systems, tools, or configurations enforce this protection requirement?
  • How do you ensure that sensor capability and data remains effective as the system evolves?

Evidence & Documentation:

  • What documentation demonstrates the implementation of SC-42?
  • Can you provide configuration evidence or system diagrams showing this protection control?
  • What logs or monitoring data verify that this control is functioning correctly?

Ask AI

Configure your API key to use AI features.