Isolate security functions enforcing access and information flow control from nonsecurity functions and from other security functions.
Security function isolation occurs because of implementation. The functions can still be scanned and monitored. Security functions that are potentially isolated from access and flow control enforcement functions include auditing, intrusion detection, and malicious code protection functions.
security functions enforcing access control are isolated from non-security functions; security functions enforcing access control are isolated from other security functions; security functions enforcing information flow control are isolated from non-security functions; security functions enforcing information flow control are isolated from other security functions.
No cross-framework mappings available