SC-3(2)

  • Requirement

    Isolate security functions enforcing access and information flow control from nonsecurity functions and from other security functions.

  • Discussion

    Security function isolation occurs because of implementation. The functions can still be scanned and monitored. Security functions that are potentially isolated from access and flow control enforcement functions include auditing, intrusion detection, and malicious code protection functions.

More Info

  • Title

    Security Function Isolation | Access and Flow Control Functions
  • Family

    System and Communications Protection
  • NIST 800-53B Baseline(s)

    • Related NIST 800-53 ID

    NIST 800-53A Assessment Guidance

    CMMC Training

    Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!