Control ID | PAT | Security Requirement |
---|---|---|
03.13.01 | P | Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems. |
03.13.02 | P | Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems. |
03.13.03 | P | Separate user functionality from system management functionality. |
03.13.04 | P | Prevent unauthorized and unintended information transfer via shared system resources. |
03.13.05 | P | Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. |
03.13.05.a | P | Publicly Accessible System Components Are Identified Policy |
03.13.05.b | P | Subnetworks for Publicly Accessible System Components Are Physically or Logically Separated from Internal Networks Policy |
03.13.06 | P | Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception). |
03.13.07 | P | Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling). |
03.13.08 | P | Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards. |
03.13.09 | P | Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity. |
03.13.10 | P | Establish and manage cryptographic keys for cryptography employed in organizational systems. |
03.13.11 | P | Employ FIPS-validated cryptography when used to protect the confidentiality of CUI. |
03.13.13 | P | Control and monitor the use of mobile code. |
03.13.14 | P | Control and monitor the use of Voice over Internet Protocol (VoIP) technologies |
03.13.15 | P | Protect the authenticity of communications sessions |
03.13.16 | P | Protect the confidentiality of CUI at rest. |
Privacy Policy | Terms of Service
© 2025 IntelComp. Powered by interlinkIQ.com, Developed by ITBlaster.net, Owned and Operated by Consultare Inc. Group, A Compliance Company. All Rights Reserved.