Under active development Content is continuously updated and improved

AC-16(8)Security Attributes

Technical

>Control Description

SECURITY ATTRIBUTES | ASSOCIATION TECHNIQUES / TECHNOLOGIES The information system implements organization-defined techniques or technologies with organization-defined level of assurance in associating security attributes to information.

>Supplemental Guidance

The association (i.e., binding) of security attributes to information within information systems is of significant importance with regard to conducting automated access enforcement and flow enforcement actions. The association of such security attributes can be accomplished with technologies/techniques providing different levels of assurance. For example, information systems can cryptographically bind security attributes to information using digital signatures with the supporting cryptographic keys protected by hardware devices (sometimes known as hardware roots of trust).

Ask AI

Configure your API key to use AI features.