Under active development Content is continuously updated and improved
Home / Frameworks / NIST SP 800-171A / 3.13 — System and Communications Protection

3.13 System and Communications Protection

Official SCF Download

52 requirements in the System and Communications Protection family

3.13.1Boundary Protection Assessment
3.13.1[a]Boundary Protection Assessment [a]
3.13.1[b]Boundary Protection Assessment [b]
3.13.1[c]Boundary Protection Assessment [c]
3.13.1[d]Boundary Protection Assessment [d]
3.13.1[e]Boundary Protection Assessment [e]
3.13.1[f]Boundary Protection Assessment [f]
3.13.1[g]Boundary Protection Assessment [g]
3.13.1[h]Boundary Protection Assessment [h]
3.13.2Architectural Design Assessment
3.13.2[a]Architectural Design Assessment [a]
3.13.2[b]Architectural Design Assessment [b]
3.13.2[c]Architectural Design Assessment [c]
3.13.2[d]Architectural Design Assessment [d]
3.13.2[e]Architectural Design Assessment [e]
3.13.2[f]Architectural Design Assessment [f]
3.13.3Role Separation Assessment
3.13.3[a]Role Separation Assessment [a]
3.13.3[b]Role Separation Assessment [b]
3.13.3[c]Role Separation Assessment [c]
3.13.4Shared Resource Control Assessment
3.13.5Public Access System Protection Assessment
3.13.5[a]Public Access System Protection Assessment [a]
3.13.5[b]Public Access System Protection Assessment [b]
3.13.6Network Communication by Exception Assessment
3.13.6[a]Network Communication by Exception Assessment [a]
3.13.6[b]Network Communication by Exception Assessment [b]
3.13.7Split Tunneling Assessment
3.13.8Cryptographic Mechanisms for CUI Assessment
3.13.8[a]Cryptographic Mechanisms for CUI Assessment [a]
3.13.8[b]Cryptographic Mechanisms for CUI Assessment [b]
3.13.8[c]Cryptographic Mechanisms for CUI Assessment [c]
3.13.9Network Connections Termination Assessment
3.13.9[a]Network Connections Termination Assessment [a]
3.13.9[b]Network Connections Termination Assessment [b]
3.13.9[c]Network Connections Termination Assessment [c]
3.13.10Cryptographic Key Management Assessment
3.13.10[a]Cryptographic Key Management Assessment [a]
3.13.10[b]Cryptographic Key Management Assessment [b]
3.13.11CUI Encryption Assessment
3.13.12Collaborative Computing Device Control Assessment
3.13.12[a]Collaborative Computing Device Control Assessment [a]
3.13.12[b]Collaborative Computing Device Control Assessment [b]
3.13.12[c]Collaborative Computing Device Control Assessment [c]
3.13.13Mobile Code Control Assessment
3.13.13[a]Mobile Code Control Assessment [a]
3.13.13[b]Mobile Code Control Assessment [b]
3.13.14Voice over Internet Protocol Assessment
3.13.14[a]Voice over Internet Protocol Assessment [a]
3.13.14[b]Voice over Internet Protocol Assessment [b]
3.13.15Communications Authenticity Assessment
3.13.16Data at Rest Protection Assessment