compliance controls are associated with this Policy definition 'Maintain separate execution domains for running processes' (bfc540fe-376c-2eef-4355-121312fa4437)
Control Domain |
Control |
Name |
MetadataId |
Category |
Title |
Owner |
Requirements |
Description |
Info |
Policy# |
FedRAMP_High_R4 |
SC-39 |
FedRAMP_High_R4_SC-39 |
FedRAMP High SC-39 |
System And Communications Protection |
Process Isolation |
Shared |
n/a |
The information system maintains a separate execution domain for each executing process.
Supplemental Guidance: Information systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each information system process has a distinct address space so that communication between processes is performed in a manner controlled through the security functions, and one process cannot modify the executing code of another process. Maintaining separate execution domains for executing processes can be achieved, for example, by implementing separate address spaces. This capability is available in most commercial operating systems that employ multi-state processor technologies. Related controls: AC-3, AC-4, AC-6, SA-4, SA-5, SA-8, SC-2, SC-3.
References: None. |
link |
1 |
FedRAMP_Moderate_R4 |
SC-39 |
FedRAMP_Moderate_R4_SC-39 |
FedRAMP Moderate SC-39 |
System And Communications Protection |
Process Isolation |
Shared |
n/a |
The information system maintains a separate execution domain for each executing process.
Supplemental Guidance: Information systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each information system process has a distinct address space so that communication between processes is performed in a manner controlled through the security functions, and one process cannot modify the executing code of another process. Maintaining separate execution domains for executing processes can be achieved, for example, by implementing separate address spaces. This capability is available in most commercial operating systems that employ multi-state processor technologies. Related controls: AC-3, AC-4, AC-6, SA-4, SA-5, SA-8, SC-2, SC-3.
References: None. |
link |
1 |
hipaa |
0817.01w2System.123-01.w |
hipaa-0817.01w2System.123-01.w |
0817.01w2System.123-01.w |
08 Network Protection |
0817.01w2System.123-01.w 01.06 Application and Information Access Control |
Shared |
n/a |
Unless the risk is identified and accepted by the data owner, sensitive systems are isolated (physically or logically) from non-sensitive applications/systems. |
|
13 |
hipaa |
0818.01w3System.12-01.w |
hipaa-0818.01w3System.12-01.w |
0818.01w3System.12-01.w |
08 Network Protection |
0818.01w3System.12-01.w 01.06 Application and Information Access Control |
Shared |
n/a |
Shared system resources (e.g., registers, main memory, secondary storage) are released back to the system, protected from disclosure to other systems/applications/users, and users cannot intentionally or unintentionally access information remnants. |
|
4 |
NIST_SP_800-53_R4 |
SC-39 |
NIST_SP_800-53_R4_SC-39 |
NIST SP 800-53 Rev. 4 SC-39 |
System And Communications Protection |
Process Isolation |
Shared |
n/a |
The information system maintains a separate execution domain for each executing process.
Supplemental Guidance: Information systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each information system process has a distinct address space so that communication between processes is performed in a manner controlled through the security functions, and one process cannot modify the executing code of another process. Maintaining separate execution domains for executing processes can be achieved, for example, by implementing separate address spaces. This capability is available in most commercial operating systems that employ multi-state processor technologies. Related controls: AC-3, AC-4, AC-6, SA-4, SA-5, SA-8, SC-2, SC-3.
References: None. |
link |
1 |
NIST_SP_800-53_R5 |
SC-39 |
NIST_SP_800-53_R5_SC-39 |
NIST SP 800-53 Rev. 5 SC-39 |
System and Communications Protection |
Process Isolation |
Shared |
n/a |
Maintain a separate execution domain for each executing system process. |
link |
1 |