SC-3(2)—Security Function Isolation
Technical
>Control Description
SECURITY FUNCTION ISOLATION | ACCESS / FLOW CONTROL FUNCTIONS The information system isolates security functions enforcing access and information flow control from non-security functions and from other security functions.
>Supplemental Guidance
Security function isolation occurs as a result of implementation; the functions can still be scanned and monitored. Security functions that are potentially isolated from access and flow control enforcement functions include, for example, auditing, intrusion detection, and anti-virus functions.
Ask AI
Configure your API key to use AI features.