SC-8 (1) Cryptographic Or Alternate Physical Protection | MODERATE | Encrypting information for transmission protects information from unauthorized disclosure and modification. Cryptographic mechanisms implemented to protect information integrity include, for example, cryptographic hash functions which have common application in digital signatures, checksums, and message authentication codes. Alternative physical security safeguards include, for example, protected distribution systems. The information system implements cryptographic mechanisms to Selection (one or more): prevent unauthorized disclosure of information; detect changes to information during transmission unless otherwise protected by Assignment: organization-defined alternative physical safeguards. SC-8 (2) Pre / Post Transmission Handling | | Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission or during reception including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. The information system maintains the Selection (one or more): confidentiality; integrity of information during preparation for transmission and during reception. SC-8 (3) Cryptographic Protection For Message Externals | | This control enhancement addresses protection against unauthorized disclosure of information. Message externals include, for example, message headers/routing information. This control enhancement prevents the exploitation of message externals and applies to both internal and external networks or links that may be visible to individuals who are not authorized users. Header/routing information is sometimes transmitted unencrypted because the information is not properly identified by organizations as having significant value or because encrypting the information can result in lower network performance and/or higher costs. Alternative physical safeguards include, for example, protected distribution systems. The information system implements cryptographic mechanisms to protect message externals unless otherwise protected by Assignment: organization-defined alternative physical safeguards. SC-8 (4) Conceal / Randomize Communications | | This control enhancement addresses protection against unauthorized disclosure of information. Communication patterns include, for example, frequency, periods, amount, and predictability. Changes to communications patterns can reveal information having intelligence value especially when combined with other available information related to missions/business functions supported by organizational information systems. This control enhancement prevents the derivation of intelligence based on communications patterns and applies to both internal and external networks or links that may be visible to individuals who are not authorized users. Encrypting the links and transmitting in continuous, fixed/random patterns prevents the derivation of intelligence from the system communications patterns. Alternative physical safeguards include, for example, protected distribution systems. The information system implements cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by Assignment: organization-defined alternative physical safeguards. |