NIST 800-53 REV 5 • SYSTEM AND INFORMATION INTEGRITY

SI-7(11)Confined Environments with Limited Privileges

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Run untrusted software in confined environments with limited privileges to contain any damage if the software turns out to be malicious.

Example 1: Use Windows Sandbox or Application Guard to open untrusted files and browse untrusted websites in an isolated, disposable container. When the sandbox is closed, any malware inside is destroyed.

Example 2: Run third-party applications in Docker containers with minimal privileges — no root access, read-only file systems, limited network access. If the application is compromised, the container limits what the attacker can do and prevents lateral movement.