STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

SC-32

System and Communications ProtectionRev 5organization

System Partitioning

Control Statement

Partition the system into [Assignment: system components] residing in separate [Selection: organization-defined value] domains or environments based on [Assignment: circumstances for the physical or logical separation of components].

Supplemental Guidance

System partitioning is part of a defense-in-depth protection strategy. Organizations determine the degree of physical separation of system components. Physical separation options include physically distinct components in separate racks in the same room, critical components in separate rooms, and geographical separation of critical components. Security categorization can guide the selection of candidates for domain partitioning. Managed interfaces restrict or prohibit network access and information flow among partitioned system components.

Related Controls (7)

AC-4AC-6SA-8SC-2SC-3SC-7SC-36

CCI Identifiers (4)

CCI-002505Defines the circumstances under which the system components are to be physically or logically separated to support partitioning.CCI-002506Partition the system into organization-defined system components residing in separate physical or logical domains or environments based on organization-defined circumstances for physical or logical separation of components.CCI-001208The organization partitions the information system into components residing in separate physical domains (or environments) as deemed necessary.CCI-002504Defines the system components into which the system is partitioned.

Linked STIG Checks (7)

Across 2 STIGs. Click to expand.