CCI stringlengths 10 10 | Contributor stringclasses 3
values | Definition stringlengths 20 773 | Type stringclasses 3
values | References stringlengths 42 210 |
|---|---|---|---|---|
CCI-000021 | DISA | Enforce dual authorization for organization-defined privileged commands and/or other organization-defined actions. | technical | NIST: NIST SP 800-53 (v3): AC-3 (2) NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (2) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (2) NIST: NIST SP 800-53A (v1): AC-3 (2).1 (ii) |
CCI-001408 | DISA | Defines privileged commands for which dual authorization is to be enforced. | policy | NIST: NIST SP 800-53 (v3): AC-3 (2) NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (2) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (2) NIST: NIST SP 800-53A (v1): AC-3 |
CCI-002152 | DISA | Defines other actions necessary for which dual authorization is to be enforced. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (2) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (2) |
CCI-002153 | DISA | Defines the mandatory access control policies that are to be enforced over all subjects and objects. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (3) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (3) |
CCI-003014 | DISA | Enforce organization-defined mandatory access control policies over all subjects and objects. | technical | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (3) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (3) |
CCI-002154 | DISA FSO | The mandatory access control policy specifies that the policy is uniformly enforced across all subjects and objects within the boundary of the information system. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (3) (a) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (3) (a) |
CCI-002155 | DISA | Enforce organization-defined mandatory access control policy over all subjects and objects where the policy specifies that a subject that has been granted access to information is constrained from passing the information to unauthorized subjects or objects. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (3) (b) (1) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (3) (b) (1) |
CCI-002156 | DISA | Enforce organization-defined mandatory access control policy over all subjects and objects where the policy specifies that a subject that has been granted access to information is constrained from granting its privileges to other subjects. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (3) (b) (2) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (3) (b) (2) |
CCI-002157 | DISA | Enforce organization-defined mandatory access control policy over all subjects and objects where the policy specifies that a subject that has been granted access to information is constrained from changing one or more security attributes on subjects, objects, the system, or system components. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (3) (b) (3) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (3) (b) (3) |
CCI-002158 | DISA | Enforce organization-defined mandatory access control policy over all subjects and objects where the policy specifies that a subject that has been granted access to information is constrained from choosing the security attributes to be associated with newly created or modified objects. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (3) (b) (4) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (3) (b) (4) |
CCI-002159 | DISA | Enforce organization-defined mandatory access control policy over all subjects and objects where the policy specifies that a subject that has been granted access to information is constrained from choosing the attribute values to be associated with newly created or modified objects. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (3) (b) (4) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (3) (b) (4) |
CCI-002160 | DISA | Enforce organization-defined mandatory access control policy over all subjects and objects where the policy specifies that a subject that has been granted access to information is constrained from changing the rules governing access control. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (3) (b) (5) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (3) (b) (5) |
CCI-002161 | DISA | Defines subjects which may explicitly be granted organization-defined privileges such that they are not limited by any of the mandatory access control constraints. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (3) (c) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (3) (c) |
CCI-002162 | DISA | Defines the privileges that may explicitly be granted to organization-defined subjects such that they are not limited by any of the mandatory access control constraints. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (3) (c) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (3) (c) |
CCI-003015 | DISA | Specifies that organization-defined subjects may explicitly be granted organization-defined privileges such that they are not limited by any defined subset (or all) of the above constraints. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (3) (c) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (3) (c) |
CCI-002163 | DISA | Defines the discretionary access control policies the information system is to enforce over subjects and objects. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (4) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (4) |
CCI-002164 | DISA | Enforce organization-defined discretionary access control policy that over the set of covered subjects and objects specified in the policy, and where the policy specifies that a subject that has been granted access to information can do one or more of the following: pass the information to any other subjects or objects... | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (4) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (4) |
CCI-002165 | DISA | Enforce organization-defined discretionary access control policies over defined subjects and objects. | technical | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (4) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (4) |
CCI-003638 | DISA | Enforce organization-defined discretionary access control policies over defined subjects and objects where the policy specifies that a subject that has been granted access to information can pass the information to any other subjects or objects. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (4) (a) |
CCI-003639 | DISA | Enforce organization-defined discretionary access control policies over defined subjects and objects where the policy specifies that a subject that has been granted access to information can grant its privileges to other subjects. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (4) (b) |
CCI-003640 | DISA | Enforce organization-defined discretionary access control policies over defined subjects and objects where the policy specifies that a subject that has been granted access to information can change security attributes on subjects, objects, the system, or the system's components. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (4) (c) |
CCI-003641 | DISA | Enforce organization-defined discretionary access control policies over defined subjects and objects where the policy specifies that a subject that has been granted access to information can choose the security attributes to be associated with newly created or revised objects. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (4) (d) |
CCI-003642 | DISA | Enforce organization-defined discretionary access control policies over defined subjects and objects where the policy specifies that a subject that has been granted access to information can change the rules governing access control. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (4) (e) |
CCI-000024 | DISA | Prevent access to organization-defined security-relevant information except during secure, non-operable system states. | technical | NIST: NIST SP 800-53 (v3): AC-3 (5) NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (5) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (5) NIST: NIST SP 800-53A (v1): AC-3 (5).1 (ii) |
CCI-001411 | DISA | Defines security-relevant information to which the information system prevents access except during secure, non-operable system states. | policy | NIST: NIST SP 800-53 (v3): AC-3 (5) NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (5) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (5) NIST: NIST SP 800-53A (v1): AC-3 (5).1 (i) |
CCI-002166 | DISA | Defines the role-based access control policies to enforce over all subjects and objects. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (7) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (7) |
CCI-002169 | DISA | Enforce a role-based access control policy over defined subjects and objects based upon organization-defined roles and users authorized to assume such roles. | technical | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (7) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (7) |
CCI-002170 | DISA | Control access based upon organization-defined roles and users authorized to assume such roles. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (7) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (7) |
CCI-002173 | DISA | Defines the roles authorized to control access based upon the role-based access control policy. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (7) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (7) |
CCI-002174 | DISA | Defines the users authorized to control access based upon the role-based access control policy. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (7) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (7) |
CCI-002177 | DISA | Defines the rules governing the timing of revocation of access authorizations. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (8) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (8) |
CCI-002178 | DISA | Enforce the revocation of access authorizations resulting from changes to the security attributes of subjects based on organization-defined rules governing the timing of revocations of access authorizations. | technical | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (8) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (8) |
CCI-002179 | DISA | Enforce the revocation of access authorizations resulting from changes to the security attributes of objects based on organization-defined rules governing the timing of revocations of access authorizations. | technical | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (8) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (8) |
CCI-002180 | DISA | Defines the controls the organization-defined system or system component is to provide to protect information released outside the established system boundary. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (9) (a) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (9) (a) |
CCI-002181 | DISA | Defines system or system components that are to provide organization-defined controls to protect information received outside the established system boundary. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (9) (a) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (9) (a) |
CCI-002182 | DISA | Release information outside of the established system boundary only if organization-defined system or system components provides organization-defined controls. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (9) (a) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (9) (a) |
CCI-002183 | DISA | Defines the controls to be used to validate the appropriateness of the information designated for release. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (9) (b) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (9) (b) |
CCI-002184 | DISA | Release information outside of the established system boundary only if organization-defined controls are used to validate the appropriateness of the information designated for release. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (9) (b) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (9) (b) |
CCI-002185 | DISA | Defines the conditions on which it will employ an audited override of automated access control mechanisms. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (10) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (10) |
CCI-002186 | DISA | Employ an audited override of automated access control mechanisms under organization-defined conditions by organization-defined roles. | technical | NIST: NIST SP 800-53 Revision 4 (v4): AC-3 (10) NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (10) |
CCI-003643 | DISA | Defines the organization-defined roles for which it will employ an audited override of automated access control mechanisms. | policy | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (10) |
CCI-003644 | DISA | Restrict direct access to data repositories containing organization-defined information types. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (11) |
CCI-003645 | DISA | Defines the information types of which to restrict direct access to data repositories. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (11) |
CCI-003646 | DISA | Require applications to assert, as part of the installation process, the access needed to the organization-defined system applications and functions. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (12) (a) |
CCI-003647 | DISA | Defines the organization-defined system applications and functions as required of the applications as part of the installation process. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (12) (a) |
CCI-003648 | DISA | Require applications to provide an enforcement mechanism to prevent other-than-asserted access. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (12) (b) |
CCI-003649 | DISA | Approve access changed after initial installations of the application. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (12) (c) |
CCI-003650 | DISA | Enforce attribute-based access control policy over defined subjects and objects based upon organization-defined attributes to assume access permissions. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (13) |
CCI-003651 | DISA | Defines the attributes to assume access permissions for enforcing attribute-based access control policy. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (13) |
CCI-003652 | DISA | Enforce attribute-based control access over defined subjects and objects based upon organization-defined attributes to assume access permissions. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (13) |
CCI-003653 | DISA | Defines the attributes to assume access permissions for enforcing attribute-based control access. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (13) |
CCI-003654 | DISA | Provide organization-defined mechanisms to enable individuals to have access to the following elements of their personally identifiable information: organization-defined elements. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (14) |
CCI-003655 | DISA | Defines the mechanisms to be provided for access to elements of personally identifiable information. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (14) |
CCI-003656 | DISA | Defines the elements of personally identifiable information. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (14) |
CCI-003657 | DISA | Enforce organization-defined mandatory access control policy over the set of covered subjects and objects specified in the policy. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (15) (a) |
CCI-003658 | DISA | Defines the mandatory access control policies that are to be enforced over all subjects and objects. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (15) (a) |
CCI-003659 | DISA | Enforce organization-defined discretionary access control policy over the set of covered subjects and objects specified in the policy. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (15) (b) |
CCI-003660 | DISA | Defines the discretionary access control policies the system is to enforce over subjects and objects. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-3 (15) (b) |
CCI-001368 | DISA | Enforce approved authorizations for controlling the flow of information within the system based on organization-defined information flow control policies. | technical | NIST: NIST SP 800-53 (v3): AC-4 NIST: NIST SP 800-53 Revision 4 (v4): AC-4 NIST: NIST SP 800-53 Revision 5 (v5): AC-4 NIST: NIST SP 800-53A (v1): AC-4.1 (iii) |
CCI-001414 | DISA | Enforce approved authorizations for controlling the flow of information between connected systems based on organization-defined information flow control policies. | technical | NIST: NIST SP 800-53 (v3): AC-4 NIST: NIST SP 800-53 Revision 4 (v4): AC-4 NIST: NIST SP 800-53 Revision 5 (v5): AC-4 NIST: NIST SP 800-53A (v1): AC-4.1 (iii) |
CCI-001548 | DISA | Defines the information flow control policies for controlling the flow of information within the system. | policy | NIST: NIST SP 800-53 (v3): AC-4 NIST: NIST SP 800-53 Revision 4 (v4): AC-4 NIST: NIST SP 800-53 Revision 5 (v5): AC-4 NIST: NIST SP 800-53A (v1): AC-4.1 (i) |
CCI-001549 | DISA | Defines the information flow control policies for controlling the flow of information between interconnected systems. | policy | NIST: NIST SP 800-53 (v3): AC-4 NIST: NIST SP 800-53 Revision 4 (v4): AC-4 NIST: NIST SP 800-53 Revision 5 (v5): AC-4 NIST: NIST SP 800-53A (v1): AC-4.1 (i) |
CCI-002187 | DISA | Defines the security attributes to be used to enforce organization-defined information flow control policies. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (1) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (1) |
CCI-002188 | DISA | Defines the information, source, and destination objects with which the organization-defined security attributes are to be associated. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (1) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (1) |
CCI-002189 | DISA | Defines the information flow control policies to be enforced for flow control decisions. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (1) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (1) |
CCI-002190 | DISA | Use organization-defined security attributes associated with organization-defined information, source, and destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions. | technical | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (1) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (1) |
CCI-003661 | DISA | Defines the privacy attributes to be used to enforce organization-defined information flow control policies. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (1) |
CCI-000026 | DISA | Use protected processing domains to enforce organization-defined information flow control policies as a basis for flow control decisions. | technical | NIST: NIST SP 800-53 (v3): AC-4 (2) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (2) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (2) NIST: NIST SP 800-53A (v1): AC-4 (2).1 |
CCI-002191 | DISA | Defines the information flow control policies to be enforced by the information system using protected processing domains. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (2) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (2) |
CCI-000027 | DISA | Enforce organization-defined information flow control policies. | technical | NIST: NIST SP 800-53 (v3): AC-4 (3) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (3) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (3) NIST: NIST SP 800-53A (v1): AC-4 (3).1 (ii) |
CCI-002192 | DISA | Defines the policies to enforce dynamic information flow control. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (3) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (3) |
CCI-000028 | DISA | Prevent encrypted information from bypassing organization-defined flow control mechanisms by employing organization-defined procedures or methods. | policy | NIST: NIST SP 800-53 (v3): AC-4 (4) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (4) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (4) NIST: NIST SP 800-53A (v1): AC-4 (4).1 |
CCI-002193 | DISA | Defines procedures or methods to be employed to prevent encrypted information from bypassing flow control mechanisms, such as decrypting the information, blocking the flow of the encrypted information, and/or terminating communications sessions attempting to pass encrypted information. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (4) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (4) |
CCI-003662 | DISA | Defines the information flow control mechanisms to prevent the bypassing of encrypted information. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (4) |
CCI-000029 | DISA | Enforce organization-defined limitations on embedding data types within other data types. | technical | NIST: NIST SP 800-53 (v3): AC-4 (5) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (5) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (5) NIST: NIST SP 800-53A (v1): AC-4 (5).1 (ii) |
CCI-001415 | DISA | Defines limitations for the embedding of data types within other data types. | policy | NIST: NIST SP 800-53 (v3): AC-4 (5) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (5) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (5) NIST: NIST SP 800-53A (v1): AC-4 (5).1 (i) |
CCI-000030 | DISA | Enforce information flow control based on organization-defined metadata. | technical | NIST: NIST SP 800-53 (v3): AC-4 (6) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (6) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (6) NIST: NIST SP 800-53A (v1): AC-4 (6).1 |
CCI-002194 | DISA | Defines the metadata the information system uses to enforce information flow control. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (6) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (6) |
CCI-000031 | DISA | Enforce one-way information flows using hardware-based flow control mechanisms. | technical | NIST: NIST SP 800-53 (v3): AC-4 (7) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (7) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (7) NIST: NIST SP 800-53A (v1): AC-4 (7).1 (ii) |
CCI-000032 | DISA | Enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows. | technical | NIST: NIST SP 800-53 (v3): AC-4 (8) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (8) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (8) (a) NIST: NIST SP 800-53A (v1): AC-4 (8).1 (ii) |
CCI-001417 | DISA | Defines security policy filters to be enforced and used as a basis for flow control decisions. | policy | NIST: NIST SP 800-53 (v3): AC-4 (8) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (8) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (8) (a) NIST: NIST SP 800-53A (v1): AC-4 (8).1 (i) |
CCI-002195 | DISA | Defines the information flows against which the organization-defined security or privacy policy filters are to be enforced. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (8) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (8) (a) |
CCI-003663 | DISA | Enforce information flow control using organization-defined privacy policy filters as a basis for flow control decisions for organization-defined information flows. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (8) (a) |
CCI-003664 | DISA | Enforce information flow control using block; strip; modify and/or quarantine data after a filter processing failure in accordance with organization-defined security or privacy policy. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (8) (b) |
CCI-003665 | DISA | Defines the security or privacy policy to be enforced using block; strip; modify and/or quarantine data after a filter processing failure. | technical | NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (8) (b) |
CCI-002196 | DISA | Defines the information flows for which will enforce the use of human reviews under organization-defined conditions. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (9) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (9) |
CCI-002197 | DISA | Defines the conditions which will require the use of human reviews of organization-defined information flows. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (9) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (9) |
CCI-002198 | DISA | Enforce the use of human reviews for organization-defined information flows under organization-defined conditions. | technical | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (9) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (9) |
CCI-000034 | DISA | Provide the capability for privileged administrators to enable and disable organization-defined security or privacy filters under organization-defined conditions. | technical | NIST: NIST SP 800-53 (v3): AC-4 (10) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (10) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (10) NIST: NIST SP 800-53A (v1): AC-4 (1).1 (ii) |
CCI-001553 | DISA | Defines security or privacy policy filters that privileged administrators have the capability to enable and disable. | policy | NIST: NIST SP 800-53 (v3): AC-4 (10) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (10) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (10) NIST: NIST SP 800-53A (v1): AC-4 (10).1 (i) |
CCI-002199 | DISA | Defines the conditions that provides the capability for privileged administrators to enable and disable organization-defined security policy filters. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (10) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (10) |
CCI-000035 | DISA | Provide the capability for privileged administrators to configure the organization-defined security or privacy policy filters to support different security or privacy policies. | technical | NIST: NIST SP 800-53 (v3): AC-4 (11) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (11) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (11) NIST: NIST SP 800-53A (v1): AC-4 (11).1 (ii) |
CCI-001554 | DISA | Defines the security or privacy policy filters that privileged administrators have the capability to configure. | policy | NIST: NIST SP 800-53 (v3): AC-4 (11) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (11) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (11) NIST: NIST SP 800-53A (v1): AC-4 (11).1 (i) |
CCI-002200 | DISA | Defines the data type identifiers to be used to validate data being transferred between different security domains. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (12) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (12) |
CCI-002201 | DISA | When transferring information between different security domains, use organization-defined data type identifiers to validate data essential for information flow decisions. | technical | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (12) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (12) |
CCI-000219 | DISA | When transferring information between different security domains, decompose information into organization-defined policy-relevant subcomponents for submission to policy enforcement mechanisms. | technical | NIST: NIST SP 800-53 (v3): AC-4 (13) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (13) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (13) NIST: NIST SP 800-53A (v1): AC-4 (13).1 |
CCI-002202 | DISA | Defines the policy-relevant subcomponents into which information being transferred between different security domains is to be decomposed for submission to policy enforcement mechanisms. | policy | NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (13) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (13) |
CCI-001371 | DISA | Defines security or privacy policy filters requiring fully enumerated formats which are to be implemented when transferring information between different security domains. | policy | NIST: NIST SP 800-53 (v3): AC-4 (14) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (14) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (14) NIST: NIST SP 800-53A (v1): AC-4 (14).1 (i) |
CCI-001372 | DISA | When transferring information between different security domains, implement organization-defined security or privacy policy filters requiring fully enumerated formats that restrict data structure and content. | technical | NIST: NIST SP 800-53 (v3): AC-4 (14) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (14) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (14) NIST: NIST SP 800-53A (v1): AC-4 (14).1 (ii) |
CCI-001373 | DISA | When transferring information between different security domains, examine the information for the presence of organization-defined unsanctioned information. | technical | NIST: NIST SP 800-53 (v3): AC-4 (15) NIST: NIST SP 800-53 Revision 4 (v4): AC-4 (15) NIST: NIST SP 800-53 Revision 5 (v5): AC-4 (15) NIST: NIST SP 800-53A (v1): AC-4 (15).1 (i) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.