AC-04 Information Flow Enforcement

Access Control

Low Moderate High

Description

The information system enforces assigned authorizations for controlling the flow of information within the system and between interconnected systems in accordance with applicable policy.

Supplemental Guidance

Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to who is allowed to access the information) and without explicit regard to subsequent accesses to that information. A few, of many, generalized examples of possible restrictions that are better expressed as flow control than access control are: keeping export controlled information from being transmitted in the clear to the Internet, blocking outside traffic that claims to be from within the organization, and not passing any web requests to the Internet that are not from the internal web proxy. Information flow control policies and enforcement mechanisms are commonly employed by organizations to control the flow of information between designated sources and destinations (e.g., networks, individuals, devices) within information systems and between interconnected systems. Flow control is based on the characteristics of the information and/or the information path. Specific examples of flow control enforcement can be found in boundary protection devices (e.g., proxies, gateways, guards, encrypted tunnels, firewalls, and routers) that employ rule sets or establish configuration settings that restrict information system services or provide a packet filtering capability. Related security control: SC-07.

MITRE ATT&CK Techniques (158)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Reconnaissance 5 Initial Access 9 Execution 10 Persistence 20 Privilege Escalation 15 Defense Evasion 24 Credential Access 17 Discovery 4 Lateral Movement 10 Collection 18 Command & Control 37 Exfiltration 14 Impact 11
Show all 158 techniques grouped by tactic

Defense Evasion

Command & Control

Compliance Mappings

ISO 27001:2022

A.5.14A.8.12A.8.20A.8.23A.8.3

ISO 27002:2022

5.148.128.208.238.3

COBIT 2019

APO14DSS05DSS06

CIS Controls v8

CIS 12CIS 13.10CIS 13.4CIS 3CIS 3.12CIS 3.13CIS 3.8CIS 9.3

NIST CSF 2.0

ID.AM-03PR.DS-10PR.IR-01

SOC 2 TSC

CC6.1CC6.1-POF6CC6.6CC6.6-POF1

PCI DSS v4.0.1

1.21.3

CSA CCM v4

DSP-05DSP-10IVS-03IVS-06UEM-11

CSA AICM v1

AIS-08DSP-05DSP-10DSP-22I&S-03I&S-06UEM-11

FINOS CCC

CCC-C05CCC-C09

ISO 42001:2023

A.9.4

IEC 62443

3-3 SR 2.13-3 SR 5.1

NIS2 Directive

Art. 21(2)(i)

PRA Operational Resilience

SS2/21-11.1

MAS TRM

9

BSI IT-Grundschutz

NET.1.1ORP.4

ANSSI

Hygiene.23Hygiene.27SecNumCloud.14.1

FINMA Circular 2023/1

IV.B.d(59)IV.C(62)IV.C(63)

OSFI B-13

B-13.3.2

EU GDPR

Art.32(1)(a)Art.44Art.46(1)Art.5(1)(f)

EU DORA

Art.9(4)(a)

BIO2

5.148.128.208.238.3

RBI CSF

Annex1.4Annex1.15ITGRCA.19

FISC Security Guidelines

FISC.T13FISC.T2FISC.T3FISC.T5FISC.T8

LGPD + BCB 4893

BCB.Art.13BCB.Art.14BCB.Art.3BCB.OpenFinanceBCB.PIXLGPD.Art.23-26LGPD.Art.33-36LGPD.Art.46

HKMA TM-E-1

TME1.10.1TME1.10.3

MLPS 2.0

8.1.2.18.1.3.28.28.5

DNB Good Practice

DNB.12.3DNB.18.4DNB.18.5

EU CRA

CRA.I.2j

SWIFT CSCF

SWIFT.1.1SWIFT.1.3SWIFT.1.4SWIFT.1.5SWIFT.2.4A

SAMA CSF

3.13.3

NCA ECC

2-142-52-7

UAE IA

T8T9

CBB TM

TM-6TM-8

Qatar NIA

ACCS

CBUAE

CR-4CR-5

CBE CSF

CTO-1CTO-2CTO-5CTO-6CTO-8

SA JS2

JS2-7.1JS2-8.2

CBN CSF

Part3.2Part3.4Part5.2

BoG CISD

CISD-VIIICISD-XICISD-XIII

POPIA

s19s72

BoM CTRM

3.103.2

IOSCO Cyber Resilience

PFMI-20PROT-2

BCBS 239

Principle 11

CPMI-IOSCO PFMI

CG.PRPFMI.P17PFMI.P22

FFIEC IS

II.C.13II.C.13(b)II.C.6II.C.9

NYDFS 500

500.18

HIPAA Security Rule

§164.308(a)(4)(i)§164.308(a)(4)(ii)(A)§164.314(b)(1)§164.314(b)(2)

ECB CROE

CROE.2.3.5

EBA ICT Guidelines

3.4.2

SEBI CSCRF

DATALOCEMAIL-SECPR.AAPR.DSPR.NS

BOT Cyber Resilience

Ch2.2Ch2.4

CMMC 2.0

AC

NERC CIP

CIP-005-7

10 CFR 73.54

73.54(c)(1)73.54(c)(2)

TSA Pipeline SD

SD-2 Sec A

IEEE 1686-2022

5.6

FERC CIP Orders

Order 887Order 2222

DOE C2M2 v2.1

ARCHITECTURE

API 1164

Sec 5Sec 8

AWIA

AWWA Sec 4

IAEA NSS 17-T

Sec 5.1Sec 5.6

PCI PTS v6

EJ

FIPS 140-3

FIPS 140-3 §7.3

PCI HSM

3

Common Criteria

CC Part 2 — FDP

ISAE 3402

Clause 4

Solvency II

Art.49(3)DR.266-DataSecEIOPA-Cloud-GL9EIOPA-ICT-4.6

Lloyd's Minimum Standards

BP2.2MS13.2MS6.1MS8.9

NAIC Insurance Data Security

4B8

HITRUST CSF v11

01.b09.e

FDA Cybersecurity Guidance

SA-4TM-2

ISO 27799

13.113.29.5H.2H.4

NHS DSPT

NDG-9.2NDG-9.5

OWASP MASVS v2.1

MASVS-STORAGE-2MASVS-PLATFORM-1MASVS-PLATFORM-2MASVS-PLATFORM-3

CCSS v9.0

1.05.4

MiCA

Art.63(1)Art.68(1)Art.76(1)

Basel SCO60

SCO60.64

BSSC Standards

NOS-04TIS-04

SEC Custody (Digital Assets)

SEC-CD-04

ISO 17799 (legacy)

10.6.211.4.511.4.611.4.7

COBIT 4.1 (legacy)

DS5.10