STIGhub
STIGs
RMF Controls
Compare
← All Controls
SC-11
System and Communications Protection
Rev 5
Trusted Path
CCI Identifiers (4)
CCI-001135
Provide a physically or logically isolated trusted communication path for communication between the user and the trusted components of the system.
CCI-001136
The organization defines security functions include information system authentication and reauthentication.
CCI-001661
Defines the security functions, to at a minimum, include system authentication and re-authentication, for permitting users to invoke the trusted communications path.
CCI-004895
Permit users to invoke the trusted communications path for communications between the user and the organization-defined security functions, including at a minimum, authentication and re-authentication.
Linked STIG Checks (62)
Across 31 STIGs. Click to expand.
▶
Apache Tomcat Application Server 9 Security Technical Implementation Guide
1 check
▶
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
2 checks
▶
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
2 checks
▶
Application Security and Development Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
3 checks
▶
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
3 checks
▶
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
1 check
▶
Cisco ASA VPN Security Technical Implementation Guide
2 checks
▶
Crunchy Data PostgreSQL Security Technical Implementation Guide
1 check
▶
EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation Guide
1 check
▶
HPE 3PAR SSMC Operating System Security Technical Implementation Guide
1 check
▶
IBM AIX 7.x Security Technical Implementation Guide
3 checks
▶
IBM WebSphere Liberty Server Security Technical Implementation Guide
1 check
▶
MariaDB Enterprise 10.x Security Technical Implementation Guide
1 check
▶
Microsoft Windows PAW Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2025 Security Technical Implementation Guide
6 checks
▶
Mirantis Kubernetes Engine Security Technical Implementation Guide
1 check
▶
Oracle Linux 7 Security Technical Implementation Guide
4 checks
▶
Oracle Linux 8 Security Technical Implementation Guide
4 checks
▶
Oracle MySQL 8.0 Security Technical Implementation Guide
1 check
▶
Oracle WebLogic Server 12c Security Technical Implementation Guide
1 check
▶
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
4 checks
▶
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
5 checks
▶
Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide
1 check
▶
Redis Enterprise 6.x Security Technical Implementation Guide
1 check
▶
Splunk Enterprise 7.x for Windows Security Technical Implementation Guide
1 check
▶
Splunk Enterprise 8.x for Linux Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
3 checks
▶
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
3 checks
▶
VMware vSphere 8.0 vCenter Appliance ESX Agent Manager (EAM) Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Security Technical Implementation Guide
1 check