Systems and Communications - Basic

Video Activity

This lesson covers Domain 15; system and communication protection. The basic security requirements are 3.13.1 and 3.13.2.

Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

1 hour 27 minutes
Video Description

This lesson covers Domain 15; system and communication protection. The basic security requirements are 3.13.1 and 3.13.2.

Video Transcription
as we move forward into domain 15. We're looking at the requirement for system and communications protection. So here we're looking at how we communicate usually cross network, whether it's wireless communication or wire communication. Internal, external.
Ah, and we have a couple of basic security requirements. Now, we have a lot of derived requirements, but the two basic security requirements
we're gonna monitor, control and protect organizational communications
at the external boundaries and key internal boundaries. So, for instance, what we're gonna do is look to isolate, trusted from untrusted. Usually we assume the internal networks your trusted, the external or under our untrusted, or perhaps even semi trusted.
So we're gonna we're gonna certainly monitor and protect
the communications as it passes across those untrusted or semi trusted channels. The second basic requirement is we're gonna implement architectural design, software development and systems engineering principles that promote effective information security within the systems. Okay, so
architectural design goes right down to the elements of the trusted computer base. Those those elements like your processor in your memory.
Ah, the system designed of the operating system kernel reference monitor, security, Colonel, all of those very, very basic essential elements to enforce that security policy of a system
Software development techniques. If you take a look at NIST Special Publication 800-53 a on and we will have will be presenting a classroom that, uh, that dictates how we're going to implement security throughout the software development life cycle.
Now this special publication 800-1 60 talks about implementing security through the system security engineering process. So certainly otherness documents and other cyber classes to help you implement Basic Requirement $3.13 too.
Up Next
NIST 800-171 Controlled Unclassified Information Course

The Cybrary NIST 800-171 course covers the 14 domains of safeguarding controlled unclassified information in non-federal agencies. Basic and derived requirements are presented for each security domain as defined in the NIST 800-171 special publication.

Instructed By