SC-48 Sensor Relocation

System and Communications Protection

New in Rev 5

Description

Relocate [Assignment: organization-defined parameters] to [Assignment: organization-defined parameters] under the following conditions or circumstances: [Assignment: organization-defined parameters].

Supplemental Guidance

Adversaries may take various paths and use different approaches as they move laterally through an organization (including its systems) to reach their target or as they attempt to exfiltrate information from the organization. The organization often only has a limited set of monitoring and detection capabilities, and they may be focused on the critical or likely infiltration or exfiltration paths. By using communications paths that the organization typically does not monitor, the adversary can increase its chances of achieving its desired goals. By relocating its sensors or monitoring capabilities to new locations, the organization can impede the adversary’s ability to achieve its goals. The relocation of the sensors or monitoring capabilities might be done based on threat information that the organization has acquired or randomly to confuse the adversary and make its lateral transition through the system or organization more challenging.

Changes from Rev 4

New control in Rev 5.

Compliance Mappings

CIS Controls v8

CIS 13

FINOS CCC

CCC-C08

IEC 62443

3-3 SR 6.2

BSI IT-Grundschutz

DER.1

ANSSI

Hygiene.39

FINMA Circular 2023/1

IV.B.d(59)IV.C(62)IV.C(66)IV.C(67)IV.C(68)IV.C(69)

RBI CSF

Annex1.4

FISC Security Guidelines

FISC.O2

NERC CIP

CIP-015-1

TSA Pipeline SD

SD-2 Sec C

FERC CIP Orders

Order 881

DOE C2M2 v2.1

SITUATION

API 1164

Sec 9

AWIA

AWWA Sec 5

IAEA NSS 17-T

Sec 5.5