Skip to content

Family 3.13 16 requirements Network protection

System & Network Protection.

Boundaries. Encryption. Trusted paths.

The big picture

SC is where the network meets the standard — boundary control, encryption, mobile code, VoIP. Cloud platforms cover much of it; you still own configuration and proof.

Most boundary and encryption controls are platform-managed — see what your cloud handles vs what you own.

Theme 1

Boundary and isolation.

3.13.1 — 3.13.5

Monitoring at boundaries, designing for security, denying by default, splitting public-facing systems, and preventing unauthorised information transfer.

Theme 2

Sessions and encryption.

3.13.6 — 3.13.11

Default-deny network communications, terminating sessions, key management, and FIPS-validated cryptography for CUI.

Theme 3

Collaborative and mobile code.

3.13.12 — 3.13.14

Controlling collaborative computing devices, posting CUI to public systems, and VoIP technology use.

Theme 4

Authenticity and CUI at rest.

3.13.15 — 3.13.16

Protecting communications session authenticity and protecting CUI at rest with cryptographic mechanisms.