Under active development Content is continuously updated and improved · Last updated Feb 18, 2026, 2:55 AM UTC
Home / Frameworks / ITSG-33 / SC — System and Communications Protection

SC System and Communications Protection

148 controls in the System and Communications Protection family

SC-1System And Communications Protection Policy And Procedures
SC-2Application Partitioning
SC-2(1)Application Partitioning
SC-3Security Function Isolation
SC-3(1)Security Function Isolation
SC-3(2)Security Function Isolation
SC-3(3)Security Function Isolation
SC-3(4)Security Function Isolation
SC-3(5)Security Function Isolation
SC-4Information In Shared Resources
SC-4(1)Information In Shared Resources
SC-4(2)Information In Shared Resources
SC-5Denial Of Service Protection
SC-5(1)Denial Of Service Protection
SC-5(2)Denial Of Service Protection
SC-5(3)Denial Of Service Protection
SC-6Resource Availability
SC-7Boundary Protection
SC-7(1)Boundary Protection
SC-7(2)Boundary Protection
SC-7(3)Boundary Protection
SC-7(4)Boundary Protection
SC-7(5)Boundary Protection
SC-7(6)Boundary Protection
SC-7(7)Boundary Protection
SC-7(8)Boundary Protection
SC-7(9)Boundary Protection
SC-7(10)Boundary Protection
SC-7(11)Boundary Protection
SC-7(12)Boundary Protection
SC-7(13)Boundary Protection
SC-7(14)Boundary Protection
SC-7(15)Boundary Protection
SC-7(16)Boundary Protection
SC-7(17)Boundary Protection
SC-7(18)Boundary Protection
SC-7(19)Boundary Protection
SC-7(20)Boundary Protection
SC-7(21)Boundary Protection
SC-7(22)Boundary Protection
SC-7(23)Boundary Protection
SC-8Transmission Confidentiality And Integrity
SC-8(1)Transmission Confidentiality And Integrity
SC-8(2)Transmission Confidentiality And Integrity
SC-8(3)Transmission Confidentiality And Integrity
SC-8(4)Transmission Confidentiality And Integrity
SC-9Transmission Confidentiality
SC-10Network Disconnect
SC-11Trusted Path
SC-11(1)Trusted Path
SC-12Cryptographic Key Establishment And Management
SC-12(1)Cryptographic Key Establishment And Management
SC-12(2)Cryptographic Key Establishment And Management
SC-12(3)Cryptographic Key Establishment And Management
SC-12(4)Cryptographic Key Establishment And Management
SC-12(5)Cryptographic Key Establishment And Management
SC-13Cryptographic Protection
SC-13(1)Cryptographic Protection
SC-13(2)Cryptographic Protection
SC-13(3)Cryptographic Protection
SC-13(4)Cryptographic Protection
SC-13(100)Cryptographic Protection
SC-13(101)Cryptographic Protection
SC-13(102)Cryptographic Protection
SC-13(103)Cryptographic Protection
SC-13(104)Cryptographic Protection
SC-14Public Access Protections
SC-15Collaborative Computing Devices
SC-15(1)Collaborative Computing Devices
SC-15(2)Collaborative Computing Devices
SC-15(3)Collaborative Computing Devices
SC-15(4)Collaborative Computing Devices
SC-16Transmission Of Security Attributes
SC-16(1)Transmission Of Security Attributes
SC-17Public Key Infrastructure Certificates
SC-18Mobile Code
SC-18(1)Mobile Code
SC-18(2)Mobile Code
SC-18(3)Mobile Code
SC-18(4)Mobile Code
SC-18(5)Mobile Code
SC-19Voice Over Internet Protocol
SC-19(100)Voice Over Internet Protocol
SC-19(101)Voice Over Internet Protocol
SC-20Secure Name / Address Resolution Service (Authoritative Source)
SC-20(1)Secure Name / Address Resolution Service (Authoritative Source)
SC-20(2)Secure Name / Address Resolution Service (Authoritative Source)
SC-21Secure Name / Address Resolution Service (Recursive Or Caching Resolver)
SC-21(1)Secure Name / Address Resolution Service (Recursive Or Caching Resolver)
SC-22Architecture And Provisioning For Name / Address Resolution Service
SC-23Session Authenticity
SC-23(1)Session Authenticity
SC-23(2)Session Authenticity
SC-23(3)Session Authenticity
SC-23(4)Session Authenticity
SC-23(5)Session Authenticity
SC-24Fail In Known State
SC-25Thin Nodes
SC-26Honeypots
SC-26(1)Honeypots
SC-27Platform-Independent Applications
SC-28Protection Of Information At Rest
SC-28(1)Protection Of Information At Rest
SC-28(2)Protection Of Information At Rest
SC-29Heterogeneity
SC-29(1)Heterogeneity
SC-30Concealment And Misdirection
SC-30(1)Concealment And Misdirection
SC-30(2)Concealment And Misdirection
SC-30(3)Concealment And Misdirection
SC-30(4)Concealment And Misdirection
SC-30(5)Concealment And Misdirection
SC-31Covert Channel Analysis
SC-31(1)Covert Channel Analysis
SC-31(2)Covert Channel Analysis
SC-31(3)Covert Channel Analysis
SC-32Information System Partitioning
SC-33Transmission Preparation Integrity
SC-34Non-Modifiable Executable Programs
SC-34(1)Non-Modifiable Executable Programs
SC-34(2)Non-Modifiable Executable Programs
SC-34(3)Non-Modifiable Executable Programs
SC-35Honeyclients
SC-36Distributed Processing And Storage
SC-36(1)Distributed Processing And Storage
SC-37Out-Of-Band Channels
SC-37(1)Out-Of-Band Channels
SC-38Operations Security
SC-39Process Isolation
SC-39(1)Process Isolation
SC-39(2)Process Isolation
SC-40Wireless Link Protection
SC-40(1)Wireless Link Protection
SC-40(2)Wireless Link Protection
SC-40(3)Wireless Link Protection
SC-40(4)Wireless Link Protection
SC-41Port And I/O Device Access
SC-42Sensor Capability And Data
SC-42(1)Sensor Capability And Data
SC-42(2)Sensor Capability And Data
SC-42(3)Sensor Capability And Data
SC-43Usage Restrictions
SC-44Detonation Chambers
SC-100Source Authentication
SC-100(1)Source Authentication
SC-100(2)Source Authentication
SC-100(3)Source Authentication
SC-101Unclassified Telecommunications Systems In Secure Facilities