SC-3(1)
-
Requirement
Employ hardware separation mechanisms to implement security function isolation.
-
Discussion
Hardware separation mechanisms include hardware ring architectures that are implemented within microprocessors and hardware-enforced address segmentation used to support logically distinct storage objects with separate attributes (i.e., readable, writeable).
CMMC Training
Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!