STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

SC-44

System and Communications ProtectionRev 5system

Detonation Chambers

Control Statement

Employ a detonation chamber capability within [Assignment: system, system component, or location].

Supplemental Guidance

Detonation chambers, also known as dynamic execution environments, allow organizations to open email attachments, execute untrusted or suspicious applications, and execute Universal Resource Locator requests in the safety of an isolated environment or a virtualized sandbox. Protected and isolated execution environments provide a means of determining whether the associated attachments or applications contain malicious code. While related to the concept of deception nets, the employment of detonation chambers is not intended to maintain a long-term environment in which adversaries can operate and their actions can be observed. Rather, detonation chambers are intended to quickly identify malicious code and either reduce the likelihood that the code is propagated to user environments of operation or prevent such propagation completely.

Related Controls (9)

SC-7SC-18SC-25SC-26SC-30SC-35SC-39SI-3SI-7

CCI Identifiers (2)

CCI-002564Defines the system, system component, or location where a detonation chamber capability is employed.CCI-002565Employ a detonation chamber capability within an organization-defined system, system component, or location.

Linked STIG Checks (0)

No STIG checks reference this control.