NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-30(5)Concealment of System Components

Employ the following techniques to hide or conceal {{ insert: param, sc-30.05_odp.02 }}: {{ insert: param, sc-30.05_odp.01 }}.

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Supplemental Guidance

By hiding, disguising, or concealing critical system components, organizations may be able to decrease the probability that adversaries target and successfully compromise those assets. Potential means to hide, disguise, or conceal system components include the configuration of routers or the use of encryption or virtualization techniques.

Practitioner Notes

Hide the existence or characteristics of specific system components so attackers do not know what to target.

Example 1: Configure your network to block ICMP echo requests to internal hosts and suppress TCP RST packets for closed ports. Attackers scanning your network receive no response, making it difficult to map your infrastructure.

Example 2: Use a reverse proxy that terminates all connections and presents a uniform front to external users. The proxy hides the number, type, and configuration of backend servers. To an attacker, everything looks like a single web server.