SC-7 (12)
SC-7 (12): Host-Based Protection
The organization implements [Assignment: organization-defined host-based boundary protection mechanisms] at [Assignment: organization-defined information system components].
Supplemental
Host-based boundary protection mechanisms include, for example, host-based firewalls. Information system components employing host-based boundary protection mechanisms include, for example, servers, workstations, and mobile devices.
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | low |
Overlays |
---|
None |