manage.get.gov/docs/compliance/dist/system-security-plans/ato/sc-5.md
Logan McDonald 1d3dfdb8d5
Add compliance documentation to source control (#116)
* add initial setup of compliance-trestle
2022-09-14 08:46:43 -04:00

2.1 KiB

implementation-status control-origination
c-not-implemented
c-inherited-cloud-gov
c-inherited-cisa
c-common-control
c-system-specific-control

sc-5 - [catalog] Denial-of-service Protection

Control Statement

  • [a] No value found the effects of the following types of denial-of-service events: types of denial-of-service events ; and

  • [b] Employ the following controls to achieve the denial-of-service objective: controls by type of denial-of-service event.

Control guidance

Denial-of-service events may occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of planning to support organizational needs with respect to capacity and bandwidth. Such attacks can occur across a wide range of network protocols (e.g., IPv4, IPv6). A variety of technologies are available to limit or eliminate the origination and effects of denial-of-service events. For example, boundary protection devices can filter certain types of packets to protect system components on internal networks from being directly affected by or the source of denial-of-service attacks. Employing increased network capacity and bandwidth combined with service redundancy also reduces the susceptibility to denial-of-service events.

Control assessment-objective

the effects of types of denial-of-service events are No value found; controls by type of denial-of-service event are employed to achieve the denial-of-service protection objective.


What is the solution and how is it implemented?


Implementation a.

Add control implementation description here for item sc-5_smt.a


Implementation b.

Add control implementation description here for item sc-5_smt.b