SC-05 Denial Of Service Protection

System and Communications Protection

Low Moderate High

Description

The information system protects against or limits the effects of the following types of denial of service attacks: [Assignment: organization-defined list of types of denial of service attacks or reference to source for current list].

Supplemental Guidance

A variety of technologies exist to limit, or in some cases, eliminate the effects of denial of service attacks. For example, boundary protection devices can filter certain types of packets to protect devices on an organization’s internal network from being directly affected by denial of service attacks. Information systems that are publicly accessible can be protected by employing increased capacity and bandwidth combined with service redundancy.

Changes from Rev 4

Adds 'Selection: protect against; limit the effects of the following types of denial of service events' Changes parameter to specific types of denial of service events Parameter removes 'or reference to sources for such information' Changes control text from 'employing security safeguards' to 'Employ the following controls to achieve the denial of service objective' Discussion amplifies definition of denial of service events

MITRE ATT&CK Techniques (1)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Impact 1

Compliance Mappings

ISO 27001:2022

A.8.6

ISO 27002:2022

8.6

COBIT 2019

BAI04

NIST CSF 2.0

PR.IR-03PR.IR-04

SOC 2 TSC

A1.1A1.1-POF1

CSA CCM v4

IVS-02IVS-09

CSA AICM v1

I&S-02I&S-09

IEC 62443

3-3 SR 7.13-3 SR 7.2

ANSSI

Hygiene.22Hygiene.27SecNumCloud.14.4

FINMA Circular 2023/1

IV.B.d(59)IV.C(62)IV.C(65)

OSFI B-13

B-13.2.6B-13.3.2

EU GDPR

Art.32(1)(b)

EU DORA

Art.9(2)

BIO2

8.6

RBI CSF

Annex1.4Annex1.13

FISC Security Guidelines

FISC.T3

DNB Good Practice

DNB.18.1

EU CRA

CRA.I.2h

SAMA CSF

3.3

NCA ECC

2-5

UAE IA

T7

CBB TM

TM-8

Qatar NIA

CS

CBUAE

CR-7

CBE CSF

CTO-6

SA JS2

JS2-7.2

CBN CSF

Part3.3

BoG CISD

CISD-VI

IOSCO Cyber Resilience

DET-2

BCBS 239

Principle 5

CPMI-IOSCO PFMI

CG.DEPFMI.P17

ECB CROE

CROE.2.3.5CROE.2.4

EBA ICT Guidelines

3.5(a)

SEBI CSCRF

PR.NS

BOT Cyber Resilience

Ch2.4

CMMC 2.0

SC

Common Criteria

CC Part 2 — FRU/FTA/FTP

Solvency II

EIOPA-ICT-4.6

Lloyd's Minimum Standards

MS8.9

FCA SYSC 13

SYSC 13.7.2SYSC 13.8.2

HITRUST CSF v11

09.e

MiCA

Art.68(1)Art.68(5)Art.62(5)

Basel SCO60

SCO60.51SCO60.53SCO60.65

BSSC Standards

NOS-04

ISO 17799 (legacy)

10.8.413.2.1

COBIT 4.1 (legacy)

None.