SC-16(2)

  • Requirement

    Implement anti-spoofing mechanisms to prevent adversaries from falsifying the security attributes indicating the successful application of the security process.

  • Discussion

    Some attack vectors operate by altering the security attributes of an information system to intentionally and maliciously implement an insufficient level of security within the system. The alteration of attributes leads organizations to believe that a greater number of security functions are in place and operational than have actually been implemented.

More Info

  • Title

    Transmission of Security and Privacy Attributes | Anti-spoofing Mechanisms
  • Family

    System and Communications Protection
  • Related NIST 800-53 ID

    SI-3;SI-4;SI-7

CMMC Training

Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!