SC-15—Collaborative Computing Devices and Applications
>Control Description
Prohibit remote activation of collaborative computing devices and applications with the following exceptions: ⚙organization-defined exceptions where remote activation is to be allowed; and
Provide an explicit indication of use to users physically present at the devices.
>FedRAMP Baseline Requirements
Parameter Values
Additional Requirements and Guidance
SC-15 Requirement: The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.
>Discussion
Collaborative computing devices and applications include remote meeting devices and applications, networked white boards, cameras, and microphones. The explicit indication of use includes signals to users when collaborative computing devices and applications are activated.
>Cross-Framework Mappings
>Programmatic Queries
Related Services
CLI Commands
aws chime list-accountsaws chime get-account-settings --account-id ACCOUNT_IDaws workspaces describe-workspace-directories --query 'Directories[].{Dir:DirectoryId,Access:WorkspaceAccessProperties}'aws chime get-global-settings>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What policies govern the implementation of collaborative computing devices and applications?
- •How are system and communications protection requirements defined and maintained?
- •Who is responsible for configuring and maintaining the security controls specified in SC-15?
Technical Implementation:
- •How is collaborative computing devices and applications technically implemented in your environment?
- •What systems, tools, or configurations enforce this protection requirement?
- •How do you ensure that collaborative computing devices and applications remains effective as the system evolves?
- •What network boundary protections are in place (firewalls, gateways, etc.)?
Evidence & Documentation:
- •What documentation demonstrates the implementation of SC-15?
- •Can you provide configuration evidence or system diagrams showing this protection control?
- •What logs or monitoring data verify that this control is functioning correctly?
- •Can you provide network architecture diagrams and firewall rulesets?
Ask AI
Configure your API key to use AI features.