SC-06 Resource Priority

System and Communications Protection

Low Moderate High

Description

The information system limits the use of resources by priority.

Supplemental Guidance

Priority protection helps prevent a lower-priority process from delaying or interfering with the information system servicing any higher-priority process.

Enhancements

(0) None.

MITRE ATT&CK Techniques (1)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Defense Evasion 1

Compliance Mappings

ISO 27001:2022

A.8.6

SOC 2 TSC

A1.1

CSA CCM v4

IVS-02

CSA AICM v1

I&S-02

ISO 42001:2023

A.4.5

IEC 62443

3-3 SR 7.2

ANSSI

Hygiene.23SecNumCloud.13.3

FINMA Circular 2023/1

IV.A(28)IV.A(29)

OSFI B-13

B-13.2.6

EU GDPR

Art.32(1)(b)

EU DORA

Art.9(2)

FISC Security Guidelines

FISC.O13

HKMA TM-E-1

TME1.5.3

EU CRA

CRA.I.2h

UAE IA

T7

CBB TM

TM-5

BCBS 239

Principle 5

EBA ICT Guidelines

3.5(a)

Common Criteria

CC Part 2 — FRU/FTA/FTP

FCA SYSC 13

SYSC 13.7.2SYSC 13.8.2

Basel SCO60

SCO60.53

ISO 17799 (legacy)

None.

COBIT 4.1 (legacy)

None.