SC-2(2)
SC-2(2): Disassociability
Store state information from applications and software separately.
Supplemental
If a system is compromised, storing applications and software separately from state information about users’ interactions with an application may better protect individuals’ privacy.
| CIA Levels | |
|---|---|
| Confidentiality | unknown |
| Integrity | unknown |
| Availability | unknown |
| Overlays |
|---|
| None |
| CSF Categories |
|---|
| None |