SC-5 - Denial-of-service Protection
Control requirements
SC-5 (a)
[IBM Assignment: Protect against] the effects of the following types of denial-of-service events: [IBM Assignment: application and volumetric based attacks (OSI layers 3, 4, 6, and 7)].
SC-5 (b)
Employ the following controls to achieve the denial-of-service objective: [IBM Assignment: annual testing of the documented DoS and DDoS mitigation technologies].
Implementation guidance
See the resources that follow to learn more about how to implement this control.
NIST supplemental guidance
Denial-of-service events may occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of planning to support organizational needs with respect to capacity and bandwidth. Such attacks can occur across a wide range of network protocols (e.g., IPv4, IPv6). A variety of technologies are available to limit or eliminate the origination and effects of denial-of-service events. For example, boundary protection devices can filter certain types of packets to protect system components on internal networks from being directly affected by or the source of denial-of-service attacks. Employing increased network capacity and bandwidth combined with service redundancy also reduces the susceptibility to denial-of-service events.