Under active development Content is continuously updated and improved

AC-4(11)Information Flow Enforcement

Technical

>Control Description

INFORMATION FLOW ENFORCEMENT | CONFIGURATION OF SECURITY POLICY FILTERS The information system provides the capability for privileged administrators to configure organization-defined security policy filters to support different security policies.

>Supplemental Guidance

For example, to reflect changes in security policies, administrators can change the list of “dirty words” that security policy mechanisms check in accordance with the definitions provided by organizations.

>Tailoring Guidance

This security control/enhancement specifies a very specialized and/or advanced capability that is not required for all systems. Consequently, inclusion in a departmental profile is made on a case by case basis.

Ask AI

Configure your API key to use AI features.