NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION
SC-40(1) — Electromagnetic Interference
Implement cryptographic mechanisms that achieve {{ insert: param, sc-40.01_odp }} against the effects of intentional electromagnetic interference.
Supplemental Guidance
The implementation of cryptographic mechanisms for electromagnetic interference protects systems against intentional jamming that might deny or impair communications by ensuring that wireless spread spectrum waveforms used to provide anti-jam protection are not predictable by unauthorized individuals. The implementation of cryptographic mechanisms may also coincidentally mitigate the effects of unintentional jamming due to interference from legitimate transmitters that share the same spectrum. Mission requirements, projected threats, concept of operations, and laws, executive orders, directives, regulations, policies, and standards determine levels of wireless link availability, cryptography needed, and performance.
Practitioner Notes
Protect wireless communications from electromagnetic interference — both accidental (from nearby equipment) and intentional (jamming attacks).
Example 1: Conduct a wireless site survey to identify sources of electromagnetic interference — microwave ovens, industrial equipment, competing WiFi networks. Position your access points and choose channels to minimize interference.
Example 2: Deploy your wireless network with redundant access points and automatic channel switching so that if one AP or channel is jammed, clients automatically roam to an unaffected AP on a different channel.