With 205 Controls, 423 enhancements and 1,394 definitions, it's overwhelming! Lucky for you, ISL's Cyber Security Professionals are here to help.
so we can discuss what Cyber Security controls mean to your organization.
SC-6 : RESOURCE PRIORITY
The information system limits the use of resources by priority.
Priority protection helps prevent a lower-priority process from delaying or interfering with the information system servicing any higher-priority process. This control does not apply to components in the information system for which there is only a single user/role.
- Control Enhancements:
- (1) The organization:
(a) Prohibits the use of binary or machine executable code from sources with limited or no warranty without accompanying source code; and
(b) Provides exceptions to the source code requirement only for compelling mission/operational requirements when no alternative solutions are available and with the express written consent of the authorizing official.
- Enhancement Supplemental Guidance: Software products without accompanying source code from sources with limited or no warranty are assessed for potential security impacts. The assessment addresses the fact that these types of software products are difficult or impossible to review, repair, or extend, given that the organization does not have access to the original source code and there is no owner who could make such repairs on behalf of the organization.
- References: None.
- Priority and Baseline Allocation:
||LOW SC-6 Not Selected
||MOD SC-6 Not Selected
||HIGH SC-6 Not Selected