SC-32: INFORMATION SYSTEM PARTITIONING
NOT SELECTED FOR INDUSTRIAL CONTROL SYSTEMS
The organization partitions the information system into [Assignment: organization-defined information system components] residing in separate physical domains or environments based on [Assignment: organization-defined circumstances for physical separation of components].
Information system partitioning is a part of a defense-in-depth protection strategy. Organizations determine the degree of physical separation of system components from physically distinct components in separate racks in the same room, to components in separate rooms for the more critical components, to more significant geographical separation of the most critical components. Security categorization can guide the selection of appropriate candidates for domain partitioning. Managed interfaces restrict or prohibit network access and information flow among partitioned information system components.
RELATED CONTROLS: SC-32
NO CONTROL ENHANCEMENTS
- FIPS Publication 199