SC — System and Communications Protection
39 controls in the System and Communications Protection family
SC-01Policy and Procedures
SC-02Separation of System and User Functionality
SC-03SC-03
SC-04Information in Shared System Resources
SC-05Denial-of-service Protection
SC-06SC-06
SC-07Boundary Protection
SC-07(03)Boundary Protection | Access Points
SC-07(04)Boundary Protection | External Telecommunications Services
SC-07(05)Boundary Protection | Deny by Default — Allow by Exception
SC-07(07)Boundary Protection | Split Tunneling for Remote Devices
SC-07(08)Boundary Protection | Route Traffic to Authenticated Proxy Servers
SC-07(10)SC-07(10)
SC-07(12)Boundary Protection | Host-based Protection
SC-07(13)SC-07(13)
SC-07(18)Boundary Protection | Fail Secure
SC-07(20)SC-07(20)
SC-07(21)SC-07(21)
SC-08Transmission Confidentiality and Integrity
SC-08(01)Transmission Confidentiality and Integrity | Cryptographic Protection
SC-10Network Disconnect
SC-12Cryptographic Key Establishment and Management
SC-12(01)SC-12(01)
SC-12(02)SC-12(02)
SC-12(03)SC-12(03)
SC-13Cryptographic Protection
SC-15Collaborative Computing Devices and Applications
SC-17Public Key Infrastructure Certificates
SC-18Mobile Code
SC-19SC-19
SC-20Secure Name/address Resolution Service (authoritative Source)
SC-21Secure Name/address Resolution Service (recursive or Caching Resolver)
SC-22Architecture and Provisioning for Name/address Resolution Service
SC-23Session Authenticity
SC-23(01)SC-23(01)
SC-24SC-24
SC-28Protection of Information at Rest
SC-28(01)Protection of Information at Rest | Cryptographic Protection
SC-39Process Isolation