manage.get.gov/docs/compliance/dist/system-security-plans/ato/sc-13.md
Logan McDonald 1d3dfdb8d5
Add compliance documentation to source control (#116)
* add initial setup of compliance-trestle
2022-09-14 08:46:43 -04:00

2.1 KiB

implementation-status control-origination
c-not-implemented
c-inherited-cloud-gov
c-inherited-cisa
c-common-control
c-system-specific-control

sc-13 - [catalog] Cryptographic Protection

Control Statement

  • [a] Determine the cryptographic uses ; and

  • [b] Implement the following types of cryptography required for each specified cryptographic use: types of cryptography.

Control guidance

Cryptography can be employed to support a variety of security solutions, including the protection of classified information and controlled unclassified information, the provision and implementation of digital signatures, and the enforcement of information separation when authorized individuals have the necessary clearances but lack the necessary formal access approvals. Cryptography can also be used to support random number and hash generation. Generally applicable cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. For example, organizations that need to protect classified information may specify the use of NSA-approved cryptography. Organizations that need to provision and implement digital signatures may specify the use of FIPS-validated cryptography. Cryptography is implemented in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.

Control assessment-objective

cryptographic uses are identified; types of cryptography for each specified cryptographic use (defined in SC-13_ODP[01]) are implemented.


What is the solution and how is it implemented?


Implementation a.

Add control implementation description here for item sc-13_smt.a


Implementation b.

Add control implementation description here for item sc-13_smt.b