SC-3(1)—Security Function Isolation
Technical
>Control Description
SECURITY FUNCTION ISOLATION | HARDWARE SEPARATION The information system utilizes underlying hardware separation mechanisms to implement security function isolation.
>Supplemental Guidance
Underlying hardware separation mechanisms include, for example, hardware ring architectures, commonly implemented within microprocessors, and hardware-enforced address segmentation used to support logically distinct storage objects with separate attributes (i.e., readable, writeable).
Ask AI
Configure your API key to use AI features.