Number | Title | Impact | Priority | Subject Area |
---|---|---|---|---|
SC-18 | Mobile Code | MODERATE | P2 | System And Communications Protection |
Instructions |
---|
The organization: SC-18a. Defines acceptable and unacceptable mobile code and mobile code technologies; SC-18b. Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and SC-18c. Authorizes, monitors, and controls the use of mobile code within the information system. |
Guidance |
---|
Decisions regarding the employment of mobile code within organizational information systems are based on the potential for the code to cause damage to the systems if used maliciously. Mobile code technologies include, for example, Java, JavaScript, ActiveX, Postscript, PDF, Shockwave movies, Flash animations, and VBScript. Usage restrictions and implementation guidance apply to both the selection and use of mobile code installed on servers and mobile code downloaded and executed on individual workstations and devices (e.g., smart phones). Mobile code policy and procedures address preventing the development, acquisition, or introduction of unacceptable mobile code within organizational information systems. |
Enhancements | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
The information system identifies Assignment: organization-defined unacceptable mobile code and takes Assignment: organization-defined corrective actions.
The organization ensures that the acquisition, development, and use of mobile code to be deployed in the information system meets Assignment: organization-defined mobile code requirements.
The information system prevents the download and execution of Assignment: organization-defined unacceptable mobile code.
The information system prevents the automatic execution of mobile code in Assignment: organization-defined software applications and enforces Assignment: organization-defined actions prior to executing the code.
The organization allows execution of permitted mobile code only in confined virtual machine environments. |