SC-26     Honeypots

The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.

                    
                

Applicable CNSSI 1253 Baselines

Confidentiality
  • L
  • M
  • H
Integrity
  • L
  • M
  • H
Availability
  • L
  • M
  • H

Supplemental Guidance

A honeypot is set up as a decoy to attract adversaries and to deflect their attacks away from the operational systems supporting organizational missions/business function. Depending upon the specific usage of the honeypot, consultation with the Office of the General Counsel before deployment may be needed.


Related Controls