Under active development Content is continuously updated and improved

SC-5(3)Denial Of Service Protection

PBMM (P3)
Secret (P3)
Technical

>Control Description

DENIAL OF SERVICE PROTECTION | DETECTION / MONITORING (a) The organization employs organization-defined monitoring tools to detect indicators of denial of service attacks against the information system; and (b) The organization monitors organization-defined information system resources to determine if sufficient resources exist to prevent effective denial of service attacks.

>Supplemental Guidance

Organizations consider utilization and capacity of information system resources when managing risk from denial of service due to malicious attacks. Denial of service attacks can originate from external or internal sources. Information system resources sensitive to denial of service include, for example, physical disk storage, memory, and CPU cycles.

Common safeguards to prevent denial of service attacks related to storage utilization and capacity include, for example, instituting disk quotas, configuring information systems to automatically alert administrators when specific storage capacity thresholds are reached, using file compression technologies to maximize available storage space, and imposing separate partitions for system and user data. Related controls: CA-7, SI-4.

Ask AI

Configure your API key to use AI features.