UCF STIG Viewer Logo

SC-8 TRANSMISSION CONFIDENTIALITY AND INTEGRITY


Overview

Number Title Impact Priority Subject Area
SC-8 Transmission Confidentiality And Integrity MODERATE P1 System And Communications Protection

Instructions
The information system protects the Selection (one or more): confidentiality; integrity of transmitted information.
Guidance
This control applies to both internal and external networks and all types of information system components from which information can be transmitted (e.g., servers, mobile devices, notebook computers, printers, copiers, scanners, facsimile machines). Communication paths outside the physical protection of a controlled boundary are exposed to the possibility of interception and modification. Protecting the confidentiality and/or integrity of organizational information can be accomplished by physical means (e.g., by employing protected distribution systems) or by logical means (e.g., employing encryption techniques). Organizations relying on commercial providers offering transmission services as commodity services rather than as fully dedicated services (i.e., services which can be highly specialized to individual customer needs), may find it difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality/integrity. In such situations, organizations determine what types of confidentiality/integrity services are available in standard, commercial telecommunication service packages. If it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, organizations implement appropriate compensating security controls or explicitly accept the additional risk.

Enhancements
SC-8 (1) Cryptographic Or Alternate Physical Protection MODERATE
Encrypting information for transmission protects information from unauthorized disclosure and modification. Cryptographic mechanisms implemented to protect information integrity include, for example, cryptographic hash functions which have common application in digital signatures, checksums, and message authentication codes. Alternative physical security safeguards include, for example, protected distribution systems.

The information system implements cryptographic mechanisms to Selection (one or more): prevent unauthorized disclosure of information; detect changes to information during transmission unless otherwise protected by Assignment: organization-defined alternative physical safeguards.

SC-8 (2) Pre / Post Transmission Handling
Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission or during reception including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information.

The information system maintains the Selection (one or more): confidentiality; integrity of information during preparation for transmission and during reception.

SC-8 (3) Cryptographic Protection For Message Externals
This control enhancement addresses protection against unauthorized disclosure of information. Message externals include, for example, message headers/routing information. This control enhancement prevents the exploitation of message externals and applies to both internal and external networks or links that may be visible to individuals who are not authorized users. Header/routing information is sometimes transmitted unencrypted because the information is not properly identified by organizations as having significant value or because encrypting the information can result in lower network performance and/or higher costs. Alternative physical safeguards include, for example, protected distribution systems.

The information system implements cryptographic mechanisms to protect message externals unless otherwise protected by Assignment: organization-defined alternative physical safeguards.

SC-8 (4) Conceal / Randomize Communications
This control enhancement addresses protection against unauthorized disclosure of information. Communication patterns include, for example, frequency, periods, amount, and predictability. Changes to communications patterns can reveal information having intelligence value especially when combined with other available information related to missions/business functions supported by organizational information systems. This control enhancement prevents the derivation of intelligence based on communications patterns and applies to both internal and external networks or links that may be visible to individuals who are not authorized users. Encrypting the links and transmitting in continuous, fixed/random patterns prevents the derivation of intelligence from the system communications patterns. Alternative physical safeguards include, for example, protected distribution systems.

The information system implements cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by Assignment: organization-defined alternative physical safeguards.