Under active development Content is continuously updated and improved

SC-3(1)Security Function Isolation

Technical

>Control Description

SECURITY FUNCTION ISOLATION | HARDWARE SEPARATION The information system utilizes underlying hardware separation mechanisms to implement security function isolation.

>Supplemental Guidance

Underlying hardware separation mechanisms include, for example, hardware ring architectures, commonly implemented within microprocessors, and hardware-enforced address segmentation used to support logically distinct storage objects with separate attributes (i.e., readable, writeable).

Ask AI

Configure your API key to use AI features.