AC-4(18)—Information Flow Enforcement
Technical
>Control Description
INFORMATION FLOW ENFORCEMENT | SECURITY ATTRIBUTE BINDING The information system binds security attributes to information using ⚙organization-defined binding techniques to facilitate information flow policy enforcement.
>Supplemental Guidance
Binding techniques implemented by information systems affect the strength of security attribute binding to information. Binding strength and the assurance associated with binding techniques play an important part in the trust organizations have in the information flow enforcement process. The binding techniques affect the number and degree of additional reviews required by organizations.
Related controls: AC-16, SC-16.
>Tailoring Guidance
This security control/enhancement specifies a very specialized and/or advanced capability that is not required for all systems. Consequently, inclusion in a departmental profile is made on a case by case basis.
Ask AI
Configure your API key to use AI features.