UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

SC-26 HONEYPOTS


Overview

Number Title Impact Priority Subject Area
SC-26 Honeypots P0 System And Communications Protection

Instructions
The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.
Guidance
A honeypot is set up as a decoy to attract adversaries and to deflect their attacks away from the operational systems supporting organizational missions/business function. Depending upon the specific usage of the honeypot, consultation with the Office of the General Counsel before deployment may be needed.

Enhancements
SC-26 (1) Detection Of Malicious Code

Withdrawn: Incorporated into SC-35.