Navigation : Feature Overview Installation and Configuration Using the On-Demand Service Using the Multi-Tenant Service Security and Compliance Information Crunchy Compliance Suite Report - STIG Compliance - NIST 800-53 Compliance -- AC - Access Control -- AT - Awareness And Training -- AU - Audit And Accountability -- CA - Security Assessment And Authorization -- CM - Configuration Management -- CP - Contingency Planning -- IA - Identification And Authentication -- IR - Incident Response -- MA - Maintenance -- MP - Media Protection -- NIST 800-53 Baseline -- PE - Physical And Environmental Protection -- PL - Planning -- PM - Program Management -- PS - Personnel Security -- RA - Risk Assessment -- SA - System And Services Acquisition -- SC - System And Communications Protection --- SC-1: System And Communications Protection Policy And Procedures --- SC-2: Application Partitioning --- SC-3: Security Function Isolation --- SC-4: Information In Shared Resources --- SC-5: Denial Of Service Protection --- SC-6: Resource Availability --- SC-7: Boundary Protection --- SC-8: Transmission Confidentiality And Integrity --- SC-9: Transmission Confidentiality --- SC-10: Network Disconnect --- SC-11: Trusted Path --- SC-12: Cryptographic Key Establishment And Management --- SC-13: Cryptographic Protection --- SC-14: Public Access Protections --- SC-15: Collaborative Computing Devices --- SC-16: Transmission Of Security Attributes --- SC-17: Public Key Infrastructure Certificates --- SC-18: Mobile Code --- SC-19: Voice Over Internet Protocol --- SC-20: Secure Name / Address Resolution Service (Authoritative Source) --- SC-21: Secure Name / Address Resolution Service (Recursive Or Caching Resolver) --- SC-22: Architecture And Provisioning For Name / Address Resolution Service --- SC-23: Session Authenticity --- SC-24: Fail In Known State --- SC-25: Thin Nodes --- SC-26: Honeypots --- SC-27: Platform-Independent Applications --- SC-28: Protection Of Information At Rest --- SC-29: Heterogeneity --- SC-30: Concealment And Misdirection --- SC-31: Covert Channel Analysis --- SC-32: Information System Partitioning --- SC-33: Transmission Preparation Integrity --- SC-34: Non-Modifiable Executable Programs --- SC-35: Honeyclients --- SC-36: Distributed Processing And Storage --- SC-37: Out-Of-Band Channels --- SC-38: Operations Security --- SC-39: Process Isolation --- SC-40: Wireless Link Protection --- SC-41: Port And I/o Device Access --- SC-42: Sensor Capability And Data --- SC-43: Usage Restrictions --- SC-44: Detonation Chambers -- SI - System And Information Integrity -- NIST 800-53 Controls Data Migration Disaster Recovery Cluster Metrics Data Loading Tools Lab Release Notes Support Administrator Runbooks Crunchy PostgreSQL for Pivotal Cloud Foundry > Crunchy Compliance Suite Report > NIST 800-53 Compliance > SC - System And Communications Protection > SC-14: Public Access Protections SC-14: Public Access Protections Generated 2019-04-12 13:01:48.067729 Status Skipped Statements [Withdrawn: Capability provided by AC-2, AC-3, AC-5, AC-6, SI-3, SI-4, SI-5, SI-7, SI-10]. SC-13: Cryptographic Protection SC-15: Collaborative Computing Devices