SC — System and Communications Protection
23 controls in the System and Communications Protection family
SC-1Policy and Procedures
SC-2Separation of System and User Functionality
SC-4Information in Shared System Resources
SC-5Denial-of-service Protection
SC-7Boundary Protection
SC-7(3)Boundary Protection | Access Points
SC-7(4)Boundary Protection | External Telecommunications Services
SC-7(5)Boundary Protection | Deny by Default — Allow by Exception
SC-8Transmission Confidentiality and Integrity
SC-8(1)Transmission Confidentiality and Integrity | Cryptographic Protection
SC-10Network Disconnect
SC-12Cryptographic Key Establishment and Management
SC-13Cryptographic Protection
SC-15Collaborative Computing Devices and Applications
SC-17Public Key Infrastructure Certificates
SC-18Mobile Code
SC-20Secure Name/address Resolution Service (authoritative Source)
SC-21Secure Name/address Resolution Service (recursive or Caching Resolver)
SC-22Architecture and Provisioning for Name/address Resolution Service
SC-23Session Authenticity
SC-28Protection of Information at Rest
SC-28(1)Protection of Information at Rest | Cryptographic Protection
SC-39Process Isolation