STIGhub
STIGs
RMF Controls
Compare
← All Controls
SC-5 (1)
System and Communications Protection
Rev 5
Denial-of-Service Protection
CCI Identifiers (2)
CCI-001094
Restrict the ability of individuals to launch organization-defined denial of service attacks against other systems.
CCI-002387
Defines the denial of service attacks against other systems that the system is to restrict the ability of individuals to launch.
Linked STIG Checks (113)
Across 76 STIGs. Click to expand.
▶
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
1 check
▶
Apache Server 2.4 UNIX Site Security Technical Implementation Guide
1 check
▶
Apache Server 2.4 Windows Server Security Technical Implementation Guide
1 check
▶
Application Layer Gateway Security Requirements Guide
1 check
▶
Application Security and Development Security Technical Implementation Guide
1 check
▶
Arista MLS DCS-7000 Series RTR Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.2x Router Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.X Router Security Technical Implementation Guide
1 check
▶
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
1 check
▶
BIND 9.x Security Technical Implementation Guide
2 checks
▶
CA API Gateway ALG Security Technical Implementation Guide
1 check
▶
Cisco IOS Router RTR Security Technical Implementation Guide
1 check
▶
Cisco IOS Switch RTR Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Router RTR Security Technical Implementation Guide
2 checks
▶
Cisco IOS XE Switch RTR Security Technical Implementation Guide
2 checks
▶
Cisco IOS XR Router RTR Security Technical Implementation Guide
2 checks
▶
Cisco NX OS Switch RTR Security Technical Implementation Guide
2 checks
▶
Container Platform Security Requirements Guide
1 check
▶
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
2 checks
▶
Domain Name System (DNS) Security Requirements Guide
1 check
▶
Dragos Platform 2.x Security Technical Implementation Guide
1 check
▶
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
1 check
▶
F5 BIG-IP TMOS DNS Security Technical Implementation Guide
1 check
▶
F5 BIG-IP TMOS Firewall Security Technical Implementation Guide
1 check
▶
F5 NGINX Security Technical Implementation Guide
1 check
▶
Firewall Security Requirements Guide
1 check
▶
Fortinet FortiGate Firewall Security Technical Implementation Guide
1 check
▶
HP FlexFabric Switch RTR Security Technical Implementation Guide
1 check
▶
IBM DataPower ALG Security Technical Implementation Guide
1 check
▶
Infoblox 7.x DNS Security Technical Implementation Guide
1 check
▶
Infoblox 8.x DNS Security Technical Implementation Guide
1 check
▶
Juniper EX Series Switches Router Security Technical Implementation Guide
2 checks
▶
Juniper Router RTR Security Technical Implementation Guide
2 checks
▶
Juniper SRX Services Gateway ALG Security Technical Implementation Guide
1 check
▶
Microsoft Defender for Endpoint Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide
3 checks
▶
Microsoft Exchange 2019 Edge Server Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide
3 checks
▶
Microsoft IIS 10.0 Site Security Technical Implementation Guide
6 checks
▶
Microsoft Windows 2012 Server Domain Name System Security Technical Implementation Guide
1 check
▶
Microsoft Windows Defender Firewall with Advanced Security Security Technical Implementation Guide
3 checks
▶
Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide
1 check
▶
Mirantis Kubernetes Engine Security Technical Implementation Guide
1 check
▶
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
11 checks
▶
Palo Alto Networks ALG Security Technical Implementation Guide
3 checks
▶
Palo Alto Networks Prisma Cloud Compute Security Technical Implementation Guide
1 check
▶
Red Hat OpenShift Container Platform 4.12 Security Technical Implementation Guide
3 checks
▶
Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide
3 checks
▶
Router Security Requirements Guide
1 check
▶
Symantec Edge SWG ALG Security Technical Implementation Guide
1 check
▶
Symantec ProxySG ALG Security Technical Implementation Guide
1 check
▶
Tanium 7.0 Security Technical Implementation Guide
1 check
▶
Tanium 7.3 Security Technical Implementation Guide
1 check
▶
Tanium 7.x Application on TanOS Security Technical Implementation Guide
1 check
▶
Tanium 7.x Security Technical Implementation Guide
1 check
▶
Trend Micro Deep Security 9.x Security Technical Implementation Guide
1 check
▶
VMW vRealize Automation 7.x HA Proxy Security Technical Implementation Guide
1 check
▶
VMware NSX 4.x Distributed Firewall Security Technical Implementation Guide
1 check
▶
VMware NSX 4.x Tier-0 Gateway Firewall Security Technical Implementation Guide
1 check
▶
VMware NSX 4.x Tier-0 Gateway Router Security Technical Implementation Guide
1 check
▶
VMware NSX 4.x Tier-1 Gateway Firewall Security Technical Implementation Guide
1 check
▶
VMware NSX-T Distributed Firewall Security Technical Implementation Guide
1 check
▶
VMware NSX-T Tier 1 Gateway Firewall Security Technical Implementation Guide
1 check
▶
VMware NSX-T Tier-0 Gateway Firewall Security Technical Implementation Guide
1 check
▶
VMware NSX-T Tier-0 Gateway RTR Security Technical Implementation Guide
1 check
▶
VMware vRealize Automation 7.x Lighttpd Security Technical Implementation Guide
1 check
▶
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide
3 checks
▶
VMware vSphere 7.0 VAMI Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance EAM Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance Perfcharts Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance UI Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) Security Technical Implementation Guide
1 check
▶
Web Server Security Requirements Guide
1 check
▶
Xylok Security Suite 20.x Security Technical Implementation Guide
1 check