SC-03 Security Function Isolation
Control: The information system isolates security functions from nonsecurity functions.
Supplemental Guidance: The information system isolates security functions from nonsecurity functions by means of partitions, domains, etc., including control of access to and integrity of, the hardware, software, and firmware that perform those security functions. The information system maintains a separate execution domain (e.g., address space) for each executing process.
(1) The information system employs underlying hardware separation mechanisms to facilitate security function isolation.
(2) The information system isolates critical security functions (i.e., functions enforcing access and information flow control) from both nonsecurity functions and from other security functions.
(3) The information system minimizes the number of nonsecurity functions included within the isolation boundary containing security functions.
(4) The information system security functions are implemented as largely independent modules that avoid unnecessary interactions between modules.
(5) The information system security functions are implemented as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
Baseline: LOW Not Selected MOD Not Selected HIGH SC-3
Family: System And Communications Protection
ISO 17799 mapping: 11.4.5
COBIT 4.1 mapping: DS5.7
PCI-DSS v2 mapping: 2.2.1