STIGhub
STIGs
RMF Controls
Compare
← All Controls
SC-5
System and Communications Protection
Rev 3
Denial-of-Service Protection
CCI Identifiers (6)
CCI-001092
The information system protects against or limits the effects of the organization-defined or referenced types of denial of service attacks.
CCI-001093
Defines the types of denial-of-service events for protecting against or limiting the effects of the denial-of-service events.
CCI-002385
Protect against or limit the effects of organization-defined types of denial-of-service events.
CCI-002386
The organization defines the security safeguards to be employed to protect the information system against, or limit the effects of, denial of service attacks.
CCI-004866
Employ organization-defined controls by type of denial-of-service to achieve the denial-of-service objective.
CCI-004867
Defines the controls by type of denial-of-service event by employing the controls to achieve the denial-of-service objective.
Linked STIG Checks (200)
Across 42 STIGs. Click to expand.
▶
A10 Networks ADC ALG Security Technical Implementation Guide
4 checks
▶
Adobe ColdFusion Security Technical Implementation Guide
18 checks
▶
Akamai KSD Service Impact Level 2 ALG Security Technical Implementation Guide
2 checks
▶
Amazon Linux 2023 Security Technical Implementation Guide
1 check
▶
Anduril NixOS Security Technical Implementation Guide
1 check
▶
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
2 checks
▶
Apache Server 2.4 Windows Server Security Technical Implementation Guide
2 checks
▶
Apache Tomcat Application Server 9 Security Technical Implementation Guide
2 checks
▶
Application Layer Gateway Security Requirements Guide
5 checks
▶
Application Programming Interface (API) Security Requirements Guide
1 check
▶
Application Security and Development Security Technical Implementation Guide
2 checks
▶
Application Server Security Requirements Guide
2 checks
▶
Arista MLS DCS-7000 Series RTR Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.2x L2S Security Technical Implementation Guide
6 checks
▶
Arista MLS EOS 4.2x Router Security Technical Implementation Guide
11 checks
▶
Arista MLS EOS 4.X L2S Security Technical Implementation Guide
7 checks
▶
Arista MLS EOS 4.X Router Security Technical Implementation Guide
11 checks
▶
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
1 check
▶
CA API Gateway ALG Security Technical Implementation Guide
2 checks
▶
CA API Gateway NDM Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
1 check
▶
Cisco ACI Layer 2 Switch Security Technical Implementation Guide
3 checks
▶
Cisco ACI Router Security Technical Implementation Guide
8 checks
▶
Cisco ASA Firewall Security Technical Implementation Guide
2 checks
▶
Cisco ASA IPS Security Technical Implementation Guide
1 check
▶
Cisco ASA NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS Router NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS Router RTR Security Technical Implementation Guide
14 checks
▶
Cisco IOS Switch L2S Security Technical Implementation Guide
8 checks
▶
Cisco IOS Switch NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS Switch RTR Security Technical Implementation Guide
9 checks
▶
Cisco IOS XE Router RTR Security Technical Implementation Guide
15 checks
▶
Cisco IOS XE Switch L2S Security Technical Implementation Guide
8 checks
▶
Cisco IOS XE Switch RTR Security Technical Implementation Guide
15 checks
▶
Cisco IOS XR Router RTR Security Technical Implementation Guide
12 checks
▶
Cisco ISE NDM Security Technical Implementation Guide
1 check
▶
Cisco NX OS Switch L2S Security Technical Implementation Guide
7 checks
▶
Cisco NX OS Switch NDM Security Technical Implementation Guide
1 check
▶
Cisco NX OS Switch RTR Security Technical Implementation Guide
7 checks