SC-7(12)
SC-7(12): Host-based Protection
Implement [host-based boundary protection mechanisms to be implemented are defined;] at [system components where host-based boundary protection mechanisms are to be implemented are defined;].
Supplemental
Host-based boundary protection mechanisms include host-based firewalls. System components that employ host-based boundary protection mechanisms include servers, workstations, notebook computers, and mobile devices.
| CIA Levels | |
|---|---|
| Confidentiality | low |
| Integrity | low |
| Availability | low |
| Overlays |
|---|
| DAF Baseline |
| CSF Categories |
|---|
| None |