Under active development Content is continuously updated and improved

SC-26Honeypots

Technical

>Control Description

(A) The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.

>Supplemental Guidance

A honeypot is set up as a decoy to attract adversaries and to deflect their attacks away from the operational systems supporting organizational missions/business function. Depending upon the specific usage of the honeypot, consultation with the Office of the General Counsel before deployment may be needed. Related controls: SC-30, SC-44, SI-3, SI-4

Ask AI

Configure your API key to use AI features.