Number | Title | Impact | Priority | Subject Area |
---|---|---|---|---|
SC-26 | Honeypots | P0 | System And Communications Protection |
Instructions |
---|
The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks. |
Guidance |
---|
A honeypot is set up as a decoy to attract adversaries and to deflect their attacks away from the operational systems supporting organizational missions/business function. Depending upon the specific usage of the honeypot, consultation with the Office of the General Counsel before deployment may be needed. |
Enhancements | ||
---|---|---|
Withdrawn: Incorporated into SC-35. |