Under active development Content is continuously updated and improved

SC-3(2)Security Function Isolation

Technical

>Control Description

SECURITY FUNCTION ISOLATION | ACCESS / FLOW CONTROL FUNCTIONS The information system isolates security functions enforcing access and information flow control from non-security functions and from other security functions.

>Supplemental Guidance

Security function isolation occurs as a result of implementation; the functions can still be scanned and monitored. Security functions that are potentially isolated from access and flow control enforcement functions include, for example, auditing, intrusion detection, and anti-virus functions.

Ask AI

Configure your API key to use AI features.