Navigation : Feature Overview Installation and Configuration Using the On-Demand Service Using the Multi-Tenant Service Security and Compliance Information Crunchy Compliance Suite Report - STIG Compliance - NIST 800-53 Compliance -- AC - Access Control -- AT - Awareness And Training -- AU - Audit And Accountability -- CA - Security Assessment And Authorization -- CM - Configuration Management -- CP - Contingency Planning -- IA - Identification And Authentication -- IR - Incident Response -- MA - Maintenance -- MP - Media Protection -- NIST 800-53 Baseline -- PE - Physical And Environmental Protection -- PL - Planning -- PM - Program Management -- PS - Personnel Security -- RA - Risk Assessment -- SA - System And Services Acquisition -- SC - System And Communications Protection -- SI - System And Information Integrity -- NIST 800-53 Controls --- AC - Access Control --- AT - Awareness And Training --- AU - Audit And Accountability --- CA - Security Assessment And Authorization --- CM - Configuration Management --- CP - Contingency Planning --- IA - Identification And Authentication --- IR - Incident Response --- MA - Maintenance --- MP - Media Protection --- PE - Physical And Environmental Protection --- PL - Planning --- PM - Program Management --- PS - Personnel Security --- RA - Risk Assessment --- SA - System And Services Acquisition --- SC - System And Communications Protection ---- SC-1: System And Communications Protection Policy And Procedures ---- SC-2: Application Partitioning ---- SC-3: Security Function Isolation ---- SC-4: Information In Shared Resources ---- SC-5: Denial Of Service Protection ---- SC-6: Resource Availability ---- SC-7: Boundary Protection ---- SC-8: Transmission Confidentiality And Integrity ---- SC-9: Transmission Confidentiality ---- SC-10: Network Disconnect ---- SC-11: Trusted Path ---- SC-12: Cryptographic Key Establishment And Management ---- SC-13: Cryptographic Protection ---- SC-14: Public Access Protections ---- SC-15: Collaborative Computing Devices ---- SC-16: Transmission Of Security Attributes ---- SC-17: Public Key Infrastructure Certificates ---- SC-18: Mobile Code ---- SC-19: Voice Over Internet Protocol ---- SC-20: Secure Name / Address Resolution Service (Authoritative Source) ---- SC-21: Secure Name / Address Resolution Service (Recursive Or Caching Resolver) ---- SC-22: Architecture And Provisioning For Name / Address Resolution Service ---- SC-23: Session Authenticity ---- SC-24: Fail In Known State ---- SC-25: Thin Nodes ---- SC-26: Honeypots ---- SC-27: Platform-Independent Applications ---- SC-28: Protection Of Information At Rest ---- SC-29: Heterogeneity ---- SC-30: Concealment And Misdirection ---- SC-31: Covert Channel Analysis ---- SC-32: Information System Partitioning ---- SC-33: Transmission Preparation Integrity ---- SC-34: Non-Modifiable Executable Programs ---- SC-35: Honeyclients ---- SC-36: Distributed Processing And Storage ---- SC-37: Out-Of-Band Channels ---- SC-38: Operations Security ---- SC-39: Process Isolation ---- SC-40: Wireless Link Protection ---- SC-41: Port And I/o Device Access ---- SC-42: Sensor Capability And Data ---- SC-43: Usage Restrictions ---- SC-44: Detonation Chambers --- SI - System And Information Integrity Data Migration Disaster Recovery Cluster Metrics Data Loading Tools Lab Release Notes Support Administrator Runbooks Crunchy PostgreSQL for Pivotal Cloud Foundry > Crunchy Compliance Suite Report > NIST 800-53 Compliance > NIST 800-53 Controls > SC - System And Communications Protection > SC-33: Transmission Preparation Integrity SC-33: Transmission Preparation Integrity Generated 2019-05-20 15:48:11.984914 Status Skipped Statements [Withdrawn: Incorporated into SC-8]. SC-32: Information System Partitioning SC-34: Non-Modifiable Executable Programs