Under active development Content is continuously updated and improved

AC-4(17)Information Flow Enforcement

Technical

>Control Description

INFORMATION FLOW ENFORCEMENT | DOMAIN AUTHENTICATION The information system uniquely identifies and authenticates source and destination points by [Selection (one or more): organization, system, application, individual] for information transfer.

>Supplemental Guidance

Attribution is a critical component of a security concept of operations. The ability to identify source and destination points for information flowing in information systems, allows the forensic reconstruction of events when required, and encourages policy compliance by attributing policy violations to specific organizations/individuals. Successful domain authentication requires that information system labels distinguish among systems, organizations, and individuals involved in preparing, sending, receiving, or disseminating information.

Related controls: IA-2, IA-3, IA-4, IA-5.

Ask AI

Configure your API key to use AI features.