An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: bugfix-XSS-85-d5bffe - rmfrev4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: bugfix-XSS-85-d5bffe - rmfrev4
Open sidebar
Navigate
Top
Search
CCIs (
5137
)
Pages (
37/172
)
CCIs
Number
Definition
Status
Related
CCI-001081
Defines the frequency for reviewing and updating the current system and communications protection procedures.
Draft
SC-1
CCI-001082
Separate user functionality, including user interface services, from system management functionality.
Draft
SC-2
CCI-001083
Prevent the presentation of system management functionality at an interface for non-privileged users.
Draft
SC-2(1)
CCI-001084
Isolate security functions from nonsecurity functions.
Draft
SC-3
CCI-001085
Employ hardware separation mechanisms to implement security function isolation.
Draft
SC-3(1)
CCI-001086
Isolate security functions enforcing access and information flow control from both nonsecurity functions and from other security functions.
Draft
SC-3(2)
CCI-001087
The organization implements an information system isolation boundary to minimize the number of nonsecurity functions included within the boundary containing security functions.
Draft
CCI-001088
The organization implements security functions as largely independent modules that avoid unnecessary interactions between modules.
Draft
CCI-001089
Implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
Draft
SC-3(5)
CCI-001090
Prevent unauthorized and unintended information transfer via shared system resources.
Draft
SC-4
CCI-001091
The information system does not share resources that are used to interface with systems operating at different security levels.
Draft
CCI-001092
The information system protects against or limits the effects of the organization-defined or referenced types of denial of service attacks.
Draft
CCI-001093
Defines the types of denial-of-service events for protecting against or limiting the effects of the denial-of-service events.
Draft
SC-5
CCI-001094
Restrict the ability of individuals to launch organization-defined denial of service attacks against other systems.
Draft
SC-5(1)
CCI-001095
Manage capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial-of-service attacks.
Draft
SC-5(2)
CCI-001096
The information system limits the use of resources by priority.
Draft
CCI-001097
Monitor and control communications at the external managed interfaces to the system and at key managed interfaces within the system.
Draft
SC-7
CCI-001098
Connect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.
Draft
SC-7
CCI-001099
The organization physically allocates publicly accessible information system components to separate subnetworks with separate physical network interfaces.
Draft
CCI-001100
The information system prevents public access into the organization's internal networks except as appropriately mediated by managed interfaces employing boundary protection devices.
Draft
CCI-001101
Limit the number of external network connections to the system.
Draft
SC-7(3)
CCI-001102
Implement a managed interface for each external telecommunication service.
Draft
SC-7(4)
CCI-001103
Establish a traffic flow policy for each managed interface for each external telecommunication service.
Draft
SC-7(4)
CCI-001104
The organization employs security controls as needed to protect the confidentiality and integrity of the information being transmitted.
Draft
CCI-001105
Document each exception to the traffic flow policy with a supporting mission or business need and duration of that need.
Draft
SC-7(4)
CCI-001106
Review exceptions to the traffic flow policy on an organization-defined frequency for each external telecommunication service.
Draft
SC-7(4)
CCI-001107
Defines a frequency for the review of exceptions to the traffic flow policy for each external telecommunication service.
Draft
SC-7(4)
CCI-001108
Remove traffic flow policy exceptions that are no longer supported by an explicit mission or business need for each external telecommunication service.
Draft
SC-7(4)
CCI-001109
Deny network communications traffic by default and allow network communications traffic by exception at managed interfaces; and/or for organization-defined systems.
Draft
SC-7(5)
CCI-001110
The organization prevents the unauthorized release of information outside of the information system boundary or any unauthorized communication through the information system boundary when there is an operational failure of the boundary protection mechanisms.
Draft
Prev
1...
33
34
35
36
37
38
39
40
41
...172
Next