SC-44 Detonation Chambers

System and Communications Protection

Description

Employ a detonation chamber capability within [Assignment: organization-defined parameters].

Supplemental Guidance

Detonation chambers, also known as dynamic execution environments, allow organizations to open email attachments, execute untrusted or suspicious applications, and execute Universal Resource Locator requests in the safety of an isolated environment or a virtualized sandbox. Protected and isolated execution environments provide a means of determining whether the associated attachments or applications contain malicious code. While related to the concept of deception nets, the employment of detonation chambers is not intended to maintain a long-term environment in which adversaries can operate and their actions can be observed. Rather, detonation chambers are intended to quickly identify malicious code and either reduce the likelihood that the code is propagated to user environments of operation or prevent such propagation completely.

Changes from Rev 4

No significant title changes from Rev 4.

Compliance Mappings

ISO 27002:2022

8.7

COBIT 2019

DSS05

CIS Controls v8

CIS 10CIS 10.7

PCI DSS v4.0.1

5.2

MAS TRM

12

BSI IT-Grundschutz

APP.1.1OPS.1.1.4

ANSSI

Hygiene.21

FINMA Circular 2023/1

IV.C(64)IV.C(65)

OSFI B-13

B-13.3.2

BIO2

8.7

RBI CSF

Annex1.13

DNB Good Practice

DNB.19.1

EU CRA

CRA.I.2i

SAMA CSF

3.6

CBB TM

TM-12TM-8

Qatar NIA

CS

CBUAE

CR-3

CBE CSF

CD-1CTO-6

SA JS2

JS2-7.3JS2-8.4

CBN CSF

Part3.5Part4

BoM CTRM

4.2

FFIEC IS

II.C.12II.C.9

NYDFS 500

500.14

HIPAA Security Rule

ยง164.308(a)(5)(ii)(B)

ECB CROE

CROE.2.3.5

SEBI CSCRF

DE.DPPR.NS

BOT Cyber Resilience

Ch3.1

Lloyd's Minimum Standards

MS8.10

NAIC Insurance Data Security

4-monitoring

HITRUST CSF v11

09.c

ISO 27799

12.2

NHS DSPT

NDG-9.3