SC-7(12)
SC-7(12): Host-based Protection
The organization implements [one of ] at [one of ].
Supplemental
Host-based boundary protection mechanisms include, for example, host-based firewalls. Information system components employing host-based boundary protection mechanisms include, for example, servers, workstations, and mobile devices.
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | low |
Overlays |
---|
None |
CSF Categories |
---|
None |