The information system enforces information flow control using explicit security attributes on information, source, and destination objects as a basis for flow control decisions.
No STIG checks reference this CCI.