ARTIFACTS

SC: SYSTEM & COMMUNICATIONS PROTECTION

What's On This Page

Each control family has a page dedicated to presenting all of the artifacts associated with the controls and control enhancements in that family. This is a consolidated view of the artifacts organized in a way to make the information usable. From here you can navigate to the individual control pages where the artifacts associated with each control or control enhancement are displayed with the control. You can use the Links Panels to select the individual controls or control enhancements you want to work with.

Supplement the artifacts here with other relevent documents and records dictated by your risk-based cybersecurity program and your information supply chain requirements.

The Source of the Artifacts

The control information comes from NIST Special Publication 800-53R4, Security and Privacy Controls for Information Systems and Organizationsand Special Publication and NIST Special Publication 800-53AR4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations Building Effective Assessment Plans. We've normalized the artifact names and annotated them with information useful in understanding these artifacts in the context of your digital enterprise, information supply chain, and security architecture.

Essential Artifacts for Risk-Based Cybersecurity Programs

This section includes core documents for risk-based cybersecurity; the POLICY & PROCEDURES document for System & Communications Protection (SC) ; and documents that are widely used in the assessment of controls and control enhancements in the System & Communications Protection (SC) family. Policy and Procedure documents from control families are in CAPS and identified with their two letter code.

CORE ARTIFACTS
WIDELY USED ARTIFACTS FOR SYSTEM AND COMMUNICATIONS PROTECTION (SC)
SYSTEM AND COMMUNICATIONS PROTECTION POLICY & PROCEDURES (AU)
System & Communications Protection policy
Information system design documentation
Information system configuration settings and associated documentation
Information system audit records
Security Authorization Package Documents:
  • Security Plan
  • Security Assessment
  • Plan of Action and Milestones (POA&M)
ESSENTIALS
ACCESS CONTROL POLICY & PROCEDURES (AC)
Asset Inventory
AUDIT & ACCOUNTABILITY POLICY & PROCEDURES (AU)
Configuration Management Plan
CONFIGURATION MANAGEMENT POLICY & PROCEDURES (CM)
Contingency Plan

  • Plans related to a comprehensive Contingency Plan:
    • Business Continuity Plans
    • Disaster Recovery Plans
    • Continuity of Operations Plans
    • Crisis Communications Plans
    • Critical Infrastructure Plans
    • Cyber Incident Response Plans
    • Insider Threat Implementation Plan
    • Occupant Emergency Plans
CONTINGENCY PLANNING POLICY & PROCEDURES (CP)
Continuous Monitoring Strategy
Continuous Monitoring Plan
Enterprise Architecture (EA)
IDENTIFICATION & AUTHENTICATION POLICY & PROCEDURES (IA)
INCIDENT RESPONSE POLICY & PROCEDURES (IR)
INFORMATION SECURITY PROGRAM PLAN (PM)
MEDIA PROTECTION POLICY & PROCEDURES (MP)
PERSONNEL SECURITY POLICY & PROCEDURES (PS)
PHYSICAL AND ENVIRONMENTAL PROTECTION POLICY & PROCEDURES (PE)
Privacy Impact Assessment
Privacy Program Plan
Risk Assessment
RISK ASSESSMENT POLICY & PROCEDURES (RA)
SECURITY ASSESSMENT & AUTHORIZATION POLICY & PROCEDURES (CA)
SECURITY AWARENESS AND TRAINING POLICY & PROCEDURES (AT)
Security Configurations
SECURITY PLANNING POLICY & PROCEDURES (PL)
SYSTEM AND COMMUNICATIONS PROTECTION POLICY & PROCEDURES (SC)
SYSTEM AND INFORMATION INTEGRITY POLICY & PROCEDURES (SI)
SYSTEM AND SERVICES ACQUISITION POLICY & PROCEDURES (SA)
System Interconnection Agreements
SYSTEM MAINTENANCE POLICY & PROCEDURES (MA)

Policy & Procedures

Here you'll find a catalog of System & Communications Protection (SC) related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

POLICES & PROCEDURES APPLICABLE
CONTROL(S)
Access control POLICY & PROCEDURES SC-15
SC-15 (1)
SC-15 (3)
SC-15 (4)
SC-16
SC-16 (1)
SC-22
SC-37
SC-37 (1)
SC-40
SC-40 (1)
SC-40 (2)
SC-40 (3)
SC-40 (4)
SC-41
SC-42
SC-42 (1)
SC-42 (2)
SC-42 (3
Configuration management POLICY & PROCEDURES SC-29 (1)
SC-30 (3)
SC-30 (4)
SC-30 (5)
Contingency planning POLICY & PROCEDURES SC-36
IDENTIFICATION & AUTHENTICATION POLICY & PROCEDURES SC-37
SC-37 (1)
Implementation POLICY & PROCEDURES SC-43
Information flow control policy SC-7 (4)
Mobile code implementation POLICY & PROCEDURES SC-18 (4)
Mobile code usage restrictions, mobile code implementation POLICY & PROCEDURES SC-18
SC-18 (1)
SC-18 (2)
SC-18 (3)
Mobile code implementation POLICY & PROCEDURES SC-18
SC-18 (1)
SC-18 (2)
SC-18 (3)
Procedures addressing application partitioning SC-2
SC-2 (1)
Procedures addressing architecture and provisioning for name/address resolution service SC-22
Procedures addressing boundary protection SC-7
SC-7 (3)
SC-7 (4)
SC-7 (5)
SC-7 (7)
SC-7 (8)
SC-7 (9)
SC-7 (10)
SC-7 (11)
SC-7 (12)
SC-7 (13)
SC-7 (14)
SC-7 (15)
SC-7 (16)
SC-7 (17)
SC-7 (18)
SC-7 (19)
SC-7 (20)
SC-7 (21)
SC-7 (22)
SC-7 (23)
Procedures addressing collaborative computing SC-15
SC-15 (1)
SC-15 (3)
SC-15 (4)
Procedures addressing concealment and misdirection techniques for the information system SC-30
SC-30 (2)
SC-30 (3)
SC-30 (4)
SC-30 (5)
Procedures addressing covert channel analysis SC-31
SC-31 (1)
SC-31 (2)
SC-31 (3)
Procedures addressing cryptographic key establishment and management SC-12
SC-12 (2)
SC-12 (3)
Procedures addressing cryptographic key establishment, management, and recovery SC-12 (1)
Procedures addressing cryptographic protection SC-13
Procedures addressing denial of service protection SC-5
SC-5 (1)
SC-5 (2)
SC-5 (3)
Procedures addressing detonation chambers SC-44
Procedures addressing firmware modifications SC-34 (3)
Procedures addressing honeyclients SC-35
Procedures addressing information protection in shared system resources SC-4
Procedures addressing information protection in shared system resources SC-4 (2)
Procedures addressing information system design documentation SC-40 (3)
SC-40 (4)
Procedures addressing information system failure to known state SC-24
Procedures addressing information system partitioning SC-32
Procedures addressing mobile code SC-18
SC-18 (1)
SC-18 (2)
SC-18 (3)
SC-18 (4)
SC-18 (5)
Procedures addressing network disconnect SC-10
Procedures addressing non-modifiable executable programs SC-34
SC-34 (1)
SC-34 (2)
Procedures addressing operations security SC-38
Procedures addressing platform-independent applications SC-27
Procedures addressing port and input/output device access SC-41
Procedures addressing prioritization of information system resources SC-6
Procedures addressing protection of information at rest SC-28
SC-28 (1)
SC-28 (2)
Procedures addressing public key infrastructure certificates SC-17
Procedures addressing secure name/address resolution service (authoritative source) SC-20
Procedures addressing secure name/address resolution service (authoritative source) SC-20 (2)
Procedures addressing secure name/address resolution service (recursive or caching resolver) SC-21
Procedures addressing security function isolation SC-3
SC-3 (1)
SC-3 (2)
SC-3 (3)
SC-3 (4)
SC-3 (5)
Procedures addressing security function isolation SC-3 (1)
Procedures addressing sensor capability and data collection SC-42
SC-42 (1)
SC-42 (3)
Procedures addressing session authenticity SC-23
SC-23 (1)
SC-23 (3)
SC-23 (5)
Procedures addressing transmission confidentiality and integrity " SC-8
SC-8 (1)
SC-8 (2)
SC-8 (3)
SC-8 (4)"
Procedures addressing transmission of security attributes SC-16
SC-16 (1)
Procedures addressing trusted communications paths SC-11
SC-11 (1)
Procedures addressing usage restrictions SC-43
Procedures addressing use of honeypots SC-26
Procedures addressing use of out-of-band channels SC-37
SC-37 (1)
Procedures addressing use of thin nodes SC-25
Procedures addressing VoIP SC-19
Procedures addressing wireless link protection SC-40
SC-40 (1)
SC-40 (2)
Public key certificate policy or policies SC-17

Evidence, Records & Artifacts

Here you'll find a catalog of System & Communications Protection (SC) related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

ARTIFACT APPLICABLE
CONTROL(S)
Acquisition contracts for information system components or services SC-29
Acquisition contracts for information system, system component, or information system service SC-18 (2)
Acquisition contracts for information systems or services SC-31 (2)
Acquisition documentation SC-18 (2)
SC-29
SC-31 (2)
Assessment results from independent, testing organizations SC-11
SC-11 (1)
SC-22
Audit logs SC-7 (15)
Authorization records SC-18
Authorization records SC-43
Boundary protection hardware and software SC-7
SC-7 (3)
SC-7 (4)
SC-7 (12)
Change control records SC-29 (1)
SC-30 (3)
Communications and network traffic monitoring logs SC-7 (3)
Configuration management records SC-29 (1)
Configuration management records SC-30 (3)
Covert channel analysis documentation SC-31
SC-31 (1)
SC-31 (2)
SC-31 (3)
Cryptographic mechanisms SC-12
Cryptographic mechanisms and associated configuration documentation SC-28
SC-28 (1)
SC-28 (2)
Cryptographic module validation certificates SC-13
Electronic transmission records SC-37
Enterprise architecture documentation SC-7 (21)
Enterprise security architecture documentation SC-7
Facilities, areas, or systems where use of devices possessing environmental sensing capabilities is prohibited SC-42 (3)
Facility communications and wiring diagram SC-7 (14)
Hardware separation mechanisms SC-3 (1)
Independent verification and validation documentation SC-39
SC-39 (1)
SC-39 (2)
Information system architecture and configuration documentation SC-7 (3)
SC-7 (4)
Information system communications hardware and software SC-40 (1)
SC-40 (2)
SC-40 (3)
SC-40 (4)
Information system components deployed to identify malicious websites and/or web-based malicious code SC-35
Information system documentation for hardware separation mechanisms SC-39 (1)
Information system documentation for multi-threaded processing SC-39 (2)
Information system documentation from vendors, manufacturers or developers SC-39 (1)
SC-39 (2)
Information system facility diagrams SC-32
Information system facility diagrams SC-36
Information system hardware and software SC-7 (7)
SC-7 (8)
SC-7 (9)
SC-7 (13)
SC-7 (14)
SC-7 (15)
SC-7 (16)
SC-7 (19)
SC-7 (20)
SC-7 (21)
SC-7 (22)
SC-7 (23)
Information system monitoring records SC-18
SC-18 (1)
SC-19
SC-43
Information system monitoring tools and techniques documentation SC-5 (3)
Information system network diagrams SC-32
Information system polling techniques and associated documentation or records SC-36 (1)
Information system security architecture SC-7 (4)
Information systems or information system components in secured work areas where collaborative computing devices are to be disabled or removed SC-15 (3)
Information systems or information system components list of connection ports or input/output devices to be physically disabled or removed on information systems or information system components SC-41
Media used to load and execute information system applications SC-34
Media used to load and execute information system operating environment SC-34
Mobile code requirements SC-18 (2)
Mobile code usage allowances SC-18 (5)
Mobile code usage restrictions SC-18 (4)
SC-18 (5)
Off-line storage locations for information at rest SC-28 (2)
Physical delivery records SC-37
Plans of action and milestones SC-38
Processing site agreements SC-36
Public key issuing process SC-17
Records of traffic flow policy exceptions SC-7 (4)
Risk assessments SC-38
Security categorization results SC-40 (1)
SC-40 (2)
Security control assessments SC-38
Sensor capability and data collection SC-42 (2)
State information to be preserved in system failure SC-24
Storage site agreements SC-36
System development life cycle documentation SC-18 (2)
SC-38
Testing and evaluation documentation, SC-39
Threat and vulnerability assessments SC-38
Traffic flow policy SC-7 (4)
Types of information, information system components, or devices requiring use of out-of-band channels for physical delivery or electronic transmission to authorized individuals or information systems SC-37
Usage restrictions SC-43
VOIP implementation guidance SC-19
VOIP usage restrictions SC-19
Wireless network diagrams SC-40
SC-40 (1)
SC-40 (2)
SC-40 (3)
SC-40 (4)
SC-42 (3)

System & Communications Protection (SC) Related Lists

These are the System & Communications Protection (SC) related lists you may need to support your security program. For the lists applicable to your systems and informations supply chain you should know the source of the list and the data it contains; how the lists are generated, where they are stored, and how they are maintained, and how to get the when you have an incident, an incident investigation or an audit.

LIST APPLICABLE
CONTROL(S)
List of acceptable mobile code and mobile code technologies SC-18
List of actions required before execution of mobile code SC-18 (4)
List of applications to be loaded from hardware-enforced, read-only media SC-34
List of approved PKI Class 3 and Class 4 certificates SC-12 (3)
List of certificate authorities allowed for verification of the establishment of protected sessions SC-23 (5)
List of communication clients independently configured by end users and external service providers SC-7 (19)
List of concealment and misdirection techniques to be employed for organizational information systems SC-30
List of confined virtual machine environments for which execution of organizationally-acceptable mobile code is allowed SC-18 (5)
List of corrective actions to be taken when unacceptable mobile code is identified SC-18 (1)
List of covert channels SC-31 (1)
List of critical security functions SC-3 (2)
List of denial of service attacks launched by individuals against information systems SC-5 (1)
List of denial of services attacks requiring employment of security safeguards to protect against or limit effects of such attacks SC-5
List of devices possessing environmental sensing capabilities SC-42 (3)
List of distributed processing and storage components subject to polling SC-36 (1)
List of failures requiring information system to fail in a known state SC-24
List of FIPS validated cryptographic modules SC-13
List of FIPS validated cryptographic products SC-12 (2)
List of information at rest requiring confidentiality and integrity protections SC-28
List of information system components to be dynamically isolated/segregated from other components of the system SC-7 (20)
List of information system components to be employed without writeable storage capability SC-34 (1)
List of information system components to be hidden or concealed SC-30 (5)
List of information system execution domains for each thread in multi-threaded processing SC-39 (2)
List of information system physical domains (or environments) SC-32
List of information system physical locations (or environments) with distributed processing and storage SC-36
List of information, information system components, or devices to be delivered to designated individuals or information systems SC-37 (1)
List of key internal boundaries of the information system SC-7
List of measures to be employed to ensure data or information collected by sensors is only used for authorized purposes SC-42 (2)
List of NSA-approved cryptographic products SC-12 (2)
SC-12 (3)
List of operating system components to be loaded from hardware-enforced, read-only media SC-34
List of operating systems and applications deployed using virtualization techniques SC-29 (1)
List of operations security safeguards SC-38
List of out-of-band channels SC-37
List of platform-independent applications SC-27
List of processing/storage locations to be changed at organizational time intervals SC-30 (3)
List of secure work areas SC-15 (3)
List of security functions to be isolated from nonsecurity functions SC-3
List of security safeguards for delivering designated information, information system components, or devices to designated individuals or information systems SC-37 (1)
List of security safeguards protecting against or limiting the effects of denial of service attacks SC-5
List of security safeguards to be employed to ensure designated individuals or information systems receive organization-defined information, information system components, or devices SC-37 (1)
List of security tools and support components to be isolated from other internal information system components SC-7 (13)
List of signal parameter attacks or references to sources for attacks SC-40
List of software applications for which automatic execution of mobile code must be prohibited SC-18 (4)
List of techniques employed to hide or conceal information system components SC-30 (5)
List of techniques to be employed to introduce randomness into organizational operations and assets SC-30 (2)
List of technologies deployed in the information system SC-29
List of types of meetings and teleconferences requiring explicit indication of current participants SC-15 (4)
List of unacceptable mobile code SC-18 (1)
List of unacceptable mobile code and mobile technologies SC-18
List or internal and external wireless links SC-40
Go to The List of Lists