// Level 3 · Controls

System and Communications Protection

Monitor and protect communications and system boundaries.

3.13.1High

Boundary Protection

Monitor, control, and protect communications at external and key internal boundaries.

3.13.2Medium

Security Engineering

Employ architectural designs, software development techniques, and systems engineering principles for secure systems.

3.13.3Medium

Subnetwork Separation

Separate user functionality from system management functionality.

3.13.4Medium

Information Sharing Prevention

Prevent unauthorized and unintended information transfer via shared system resources.

3.13.5High

Public-Access System Components

Implement subnetworks for publicly accessible system components separated from internal networks.

3.13.6Medium

Network Communications

Deny network communications by default and allow by exception.

3.13.7Medium

Split Tunneling Prevention

Prevent remote devices from simultaneously establishing non-remote connections and external communications.

3.13.8Critical

Transmission Confidentiality

Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI in transit.

3.13.9Low

Network Disconnect

Terminate network connections at end of session or after inactivity.

3.13.10High

Cryptographic Key Management

Establish and manage cryptographic keys for cryptography employed in the system.

3.13.11High

FIPS-Validated Cryptography

Employ FIPS-validated cryptography when used to protect CUI.

3.13.12Medium

Collaborative Computing

Prohibit remote activation of collaborative computing devices and provide indication when in use.

3.13.13Medium

Mobile Code

Control and monitor the use of mobile code.

3.13.14Medium

VoIP

Control and monitor the use of Voice over Internet Protocol technologies.

3.13.15High

Communications Authenticity

Protect the authenticity of communications sessions.

3.13.16Critical

Data at Rest

Protect the confidentiality of CUI at rest.