NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-40(1)Electromagnetic Interference

Implement cryptographic mechanisms that achieve {{ insert: param, sc-40.01_odp }} against the effects of intentional electromagnetic interference.

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

Supplemental Guidance

The implementation of cryptographic mechanisms for electromagnetic interference protects systems against intentional jamming that might deny or impair communications by ensuring that wireless spread spectrum waveforms used to provide anti-jam protection are not predictable by unauthorized individuals. The implementation of cryptographic mechanisms may also coincidentally mitigate the effects of unintentional jamming due to interference from legitimate transmitters that share the same spectrum. Mission requirements, projected threats, concept of operations, and laws, executive orders, directives, regulations, policies, and standards determine levels of wireless link availability, cryptography needed, and performance.

Practitioner Notes

Protect wireless communications from electromagnetic interference — both accidental (from nearby equipment) and intentional (jamming attacks).

Example 1: Conduct a wireless site survey to identify sources of electromagnetic interference — microwave ovens, industrial equipment, competing WiFi networks. Position your access points and choose channels to minimize interference.

Example 2: Deploy your wireless network with redundant access points and automatic channel switching so that if one AP or channel is jammed, clients automatically roam to an unaffected AP on a different channel.