IBM Cloud Docs
SC-5 - Denial-of-service Protection

SC-5 - Denial-of-service Protection

Control requirements

SC-5 (a)

[IBM Assignment: Protect against] the effects of the following types of denial-of-service events: [IBM Assignment: application and volumetric based attacks (OSI layers 3, 4, 6, and 7)].

SC-5 (b)

Employ the following controls to achieve the denial-of-service objective: [IBM Assignment: annual testing of the documented DoS and DDoS mitigation technologies].

Implementation guidance

See the resources that follow to learn more about how to implement this control.

NIST supplemental guidance

Denial-of-service events may occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of planning to support organizational needs with respect to capacity and bandwidth. Such attacks can occur across a wide range of network protocols (e.g., IPv4, IPv6). A variety of technologies are available to limit or eliminate the origination and effects of denial-of-service events. For example, boundary protection devices can filter certain types of packets to protect system components on internal networks from being directly affected by or the source of denial-of-service attacks. Employing increased network capacity and bandwidth combined with service redundancy also reduces the susceptibility to denial-of-service events.