SC-30(5)—Concealment Of System Components
>Control Description
The enterprise may employ various concealment and misdirection techniques to protect information about the information system being developed and the enterprise’s information systems and networks. For example, the delivery of critical components to a central or trusted third-party depot can be used to conceal or misdirect any information regarding the component’s use or the enterprise using the component. Separating components from their associated information into differing physical and electronic delivery channels and obfuscating the information through various techniques can be used to conceal information and reduce the opportunity for a potential loss of confidentiality of the component or its use, condition, or other attributes.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.