SC-5 Denial of Service Protection

Description

A variety of technologies exist to limit, or in some cases, eliminate the effects of denial-of-service attacks. For example, boundary protection devices can filter certain types of packets to protect information system components on internal organizational networks from being directly affected by denial-of-service attacks.

Employing increased capacity and bandwidth combined with service redundancy may also reduce the susceptibility to denial-of-service attacks.

Applicability

This Control applies to all TAMU-CC network information resources. The intended audience for this Control includes all information resource owners and custodians.

Implementation

The information system protects against or limits the effects of the following types of denial-of-service attacks. The Director of Infrastructure or his/her designated representative and The Chief Information Security and Privacy Officer (CISPO) shall: 

  1. Establish a security strategy that includes perimeter protection.
  2. Provide security information management services to include external network monitoring, scanning, and alerting for state organizations that utilize state information resources as specified in Texas Government Code, Chapter 2054, Information Resources [TGC 2054] and Chapter 2059, Texas Computer Network Security System [TGC 2059]. Perimeter security controls may include some or all of the following components: DMZ, firewall, intrusion detection or prevention system, or router.

Revision History

Last Updated: February 21, 2025

Previous Versions:

  • June 29, 2023
  • May 31, 2022
  • March 25, 2021
  • September 16, 2019