NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-36(1)Polling Techniques

Employ polling techniques to identify potential faults, errors, or compromises to the following processing and storage components: {{ insert: param, sc-36.01_odp.01 }} ; and Take the following actions in response to identified faults, errors, or compromises: {{ insert: param, sc-36.01_odp.02 }}.

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

Supplemental Guidance

Distributed processing and/or storage may be used to reduce opportunities for adversaries to compromise the confidentiality, integrity, or availability of organizational information and systems. However, the distribution of processing and storage components does not prevent adversaries from compromising one or more of the components. Polling compares the processing results and/or storage content from the distributed components and subsequently votes on the outcomes. Polling identifies potential faults, compromises, or errors in the distributed processing and storage components.

Practitioner Notes

Use polling techniques to verify the integrity and consistency of distributed data — periodically checking that copies at different locations match.

Example 1: Configure your database replication monitoring to run periodic consistency checks between primary and replica databases. SQL Server DBCC CHECKDB can verify data integrity, and replication latency monitors ensure replicas stay in sync.

Example 2: Use file integrity monitoring (like Tripwire or OSSEC) across distributed file stores. Periodically compare checksums of critical files between locations. Discrepancies trigger alerts that could indicate tampering or replication failures.