An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.07.1-5f5778 - rmfrev4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.07.1-5f5778 - rmfrev4
Open sidebar
Navigate
Top
Search
CCIs (
5137
)
Pages (
80/172
)
CCIs
Number
Definition
Status
Related
CCI-002401
Defines the authorized sources from which the system will allow incoming communications.
Draft
SC-7(11)
CCI-002402
Defines the authorized destinations for routing inbound communications.
Draft
SC-7(11)
CCI-002403
Only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
Draft
SC-7(11)
CCI-002404
Defines the host-based boundary protection mechanisms that are to be implemented at organization-defined system components.
Draft
SC-7(12)
CCI-002405
Defines the system components at which organization-defined host-based boundary protection mechanisms will be implemented.
Draft
SC-7(12)
CCI-002406
Implement organization-defined host-based boundary protection mechanisms at organization-defined system components.
Draft
SC-7(12)
CCI-002407
Defines the managed interfaces at which protect against unauthorized physical connections.
Draft
SC-7(14)
CCI-002408
Defines the communication clients that are independently configured by end users and external service providers which will block both inbound and outbound communications traffic.
Draft
SC-7(19)
CCI-002409
Block inbound and outbound communications traffic between organization-defined communication clients that are independently configured by end users and external service providers.
Draft
SC-7(19)
CCI-002410
Defines system components that are to be dynamically isolated from other system components.
Draft
SC-7(20)
CCI-002411
Provide the capability to dynamically isolate organization-defined system components from other system components.
Draft
SC-7(20)
CCI-002412
The organization defines the information system components supporting organization-defined missions and/or business functions that are to be separated using boundary protection mechanisms.
Deprecated
SC-7(21)
CCI-002413
Defines the system components supporting organization-defined missions and/or business functions that are to be isolated using boundary protection mechanisms.
Draft
SC-7(21)
CCI-002414
Defines the missions and/or business functions for which boundary protection mechanisms will be employed to isolate the supporting organization-defined system components.
Draft
SC-7(21)
CCI-002415
Employ boundary protection mechanisms to isolate organization-defined system components supporting organization-defined missions and/or business functions.
Draft
SC-7(21)
CCI-002416
Implement separate network addresses to connect to systems in different security domains.
Draft
SC-7(22)
CCI-002417
Disable feedback to senders on protocol format validation failure.
Draft
SC-7(23)
CCI-002418
Protect the confidentiality and/or integrity of transmitted information.
Draft
SC-8
CCI-002419
The organization defines the alternative physical safeguards to be employed when cryptographic mechanisms are not implemented to protect information during transmission.
Draft
SC-8(1)
CCI-002420
Maintain the confidentiality and/or integrity of information during preparation for transmission.
Draft
SC-8(2)
CCI-002421
Implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.
Draft
SC-8(1)
CCI-002422
Maintain the confidentiality and/or integrity of information during reception.
Draft
SC-8(2)
CCI-002423
Implement cryptographic mechanisms to protect message externals unless otherwise protected by organization-defined alternative physical controls.
Draft
SC-8(3)
CCI-002424
Defines the alternative physical controls to be employed when cryptographic mechanisms to conceal or randomize communication patterns are not implemented.
Draft
SC-8(4)
CCI-002425
Implement cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by organization-defined alternative physical controls.
Draft
SC-8(4)
CCI-002426
Provide a trusted communications path that is irrefutably distinguishable from other communications paths.
Draft
SC-11(1)
CCI-002427
Defines the alternative physical controls to be employed to protect message externals when cryptographic mechanisms are not implemented.
Draft
SC-8(3)
CCI-002428
Defines the requirements for cryptographic key generation to be employed within the system.
Draft
SC-12
CCI-002429
Defines the requirements for cryptographic key distribution to be employed within the system.
Draft
SC-12
CCI-002430
Defines the requirements for cryptographic key storage to be employed within the system.
Draft
SC-12
Prev
1...
76
77
78
79
80
81
82
83
84
...172
Next