Download The 34 System And Communications Protection Assessment Cases (Zipped Word File)
| CONTROL NUMBER |
CONTROL NAME |
| SC-1 |
System and Communications Protection Policy and Procedures |
| SC-2 |
Application Partitioning |
| SC-3 |
Security Function Isolation |
| SC-4 |
Information In Shared Resources |
| SC-5 |
Denial of Service Protection |
| SC-6 |
Resource Priority |
| SC-7 |
Boundary Protection |
| SC-8 |
Transmission Integrity |
| SC-9 |
Transmission Confidentiality |
| SC-10 |
Network Disconnect |
| SC-11 |
Trusted Path |
| SC-12 |
Cryptographic Key Establishment and Management |
| SC-13 |
Use of Cryptography |
| SC-14 |
Public Access Protections |
| SC-15 |
Collaborative Computing Devices |
| SC-16 |
Transmission of Security Attributes |
| SC-17 |
Public Key Infrastructure Certificates |
| SC-18 |
Mobile Code |
| SC-19 |
Voice Over Internet Protocol |
| SC-20 |
Secure Name /Address Resolution Service (Authoritative Source) |
| SC-21 |
Secure Name /Address Resolution Service (Recursive or Caching Resolver) |
| SC-22 |
Architecture and Provisioning for Name/Address Resolution Service |
| SC-23 |
Session Authenticity |
| SC-24 |
Fail in Known State |
| SC-25 |
Thin Nodes |
| SC-26 |
Honeypots |
| SC-27 |
Operating System-Independent Applications |
| SC-28 |
Protection of Information at Rest |
| SC-29 |
Heterogeneity |
| SC-30 |
Virtualization Techniques |
| SC-31 |
Covert Channel Analysis |
| SC-32 |
Information System Partitioning |
| SC-33 |
Transmission Preparation Integrity |
| SC-34 |
Non-Modifiable Executable Programs |