SC-7(12)
SC-7(12): Host-based Protection
The organization implements [organization-defined host-based boundary protection mechanisms] at [organization-defined information system components].
Supplemental
Host-based boundary protection mechanisms include, for example, host-based firewalls. Information system components employing host-based boundary protection mechanisms include, for example, servers, workstations, and mobile devices.
CIA Levels | |
---|---|
Confidentiality | high |
Integrity | high |
Availability | high |
Overlays |
---|
None |
CSF Categories |
---|
None |