Denial-of-Service Protection

To meet the denial-of-service protection requirement in NIST SP 800-53 Rev. 5 SC-5, you must define the denial-of-service (DoS) events that matter to your environment and implement controls that prevent, detect, absorb, and recover from those events with minimal impact to mission services. Examiners will look for clear scoping, engineered protections, and evidence those protections are monitored and tested. (NIST Special Publication 800-53 Revision 5)

Key takeaways:

  • SC-5 is only “met” when you define your DoS threat types and map each to concrete, operating controls. (NIST Special Publication 800-53 Revision 5)
  • Evidence matters as much as architecture: baselines, configs, runbooks, logs, tests, and incident records. (NIST Special Publication 800-53 Revision 5)
  • Third parties (CDN, DDoS scrubbing, DNS, SaaS dependencies) must be in scope because their failure becomes your outage. (NIST Special Publication 800-53 Revision 5)

Denial-of-service protection is a reliability and security control with a simple examiner lens: “Show me you can keep critical services available when someone (or something) tries to exhaust your capacity.” Under FedRAMP Moderate, SC-5 requires you to protect against, or limit the effects of, organization-defined DoS events by employing organization-defined controls. (NIST Special Publication 800-53 Revision 5)

The operational trap is treating SC-5 like a single tool purchase. In practice, the requirement forces you to (1) decide what “DoS” means for your architecture (network floods, application-layer abuse, resource exhaustion, noisy-neighbor saturation, upstream DNS failure), (2) implement layered controls across edge, network, app, and platform, and (3) prove those controls run day-to-day with monitoring, alerting, and tested response.

This page is written for a Compliance Officer, CCO, or GRC lead who needs to translate SC-5 into an implementable checklist: scoping decisions, control design, ownership, evidence, audit questions, and a phased execution plan you can run with engineering and operations.

Regulatory text

Control requirement (SC-5): “Protect against or limit the effects of organization-defined types of denial-of-service events by employing organization-defined controls.” (NIST Special Publication 800-53 Revision 5)

What the operator must do:

  1. Define your DoS event types (the “organization-defined types” clause). This is a required scoping decision, not optional.
  2. Select and implement controls that prevent or limit impact for each defined type.
  3. Operate and sustain those controls: monitoring, alerting, capacity management, testing, and response procedures.
  4. Retain evidence that ties definitions → controls → operations → outcomes.

Plain-English interpretation (what SC-5 really asks for)

SC-5 expects a defensible, engineered approach to keeping systems available under stress. You are not required to guarantee zero downtime. You are required to reduce the likelihood and blast radius of DoS conditions that are relevant to your system, and to show that your protections are real (configured, monitored, and used).

A practical reading for audit: if you cannot name your DoS event types, show where they are monitored, and demonstrate how you would respond, you will struggle to show compliance even if you have some technical safeguards in place. (NIST Special Publication 800-53 Revision 5)

Who it applies to (entity + operational context)

In scope:

  • Cloud Service Providers operating FedRAMP Moderate-authorized systems. (NIST Special Publication 800-53 Revision 5)
  • Federal Agencies operating or inheriting services within FedRAMP-authorized environments. (NIST Special Publication 800-53 Revision 5)

Operational contexts that matter:

  • Internet-facing services: web apps, APIs, SSO endpoints, VPN/ZTNA, DNS.
  • Shared infrastructure: multi-tenant platforms, Kubernetes clusters, shared databases, shared message brokers.
  • Upstream dependencies (third parties): CDN/WAF providers, DDoS scrubbing services, authoritative DNS providers, identity providers, SaaS platforms that your workflow depends on. If they fail under DoS, your service fails; auditors will expect you to have identified and addressed that dependency risk.

What you actually need to do (step-by-step)

1) Define “organization-defined DoS events” (make this a controlled decision)

Create a short list of DoS event types relevant to your environment, with unambiguous examples. Keep it specific enough that engineering can map controls to it.

A workable taxonomy:

  • Volumetric network floods (bandwidth saturation, SYN floods).
  • Protocol/connection exhaustion (state table exhaustion, TLS handshake abuse).
  • Application-layer request floods (HTTP GET/POST floods, GraphQL query abuse, expensive search endpoints).
  • Resource exhaustion inside the platform (CPU/memory/FD exhaustion, thread pool starvation, DB connection exhaustion).
  • Noisy-neighbor saturation (one tenant workload starving others).
  • Upstream dependency DoS (DNS provider outage, CDN degradation, IdP throttling).

Deliverable: a one-page “DoS Event Definitions” standard owned by Security/Architecture and referenced in your SC-5 control narrative. (NIST Special Publication 800-53 Revision 5)

2) Map each DoS type to layered controls (edge, network, app, platform)

Build a control matrix that answers: “For each DoS event type, what prevents it, what detects it, what limits impact, and what restores service?”

Example control mapping (illustrative):

  • Volumetric floods → upstream DDoS protection, anycast/CDN absorption, rate limits at edge, network ACLs.
  • App-layer floods → WAF rules, per-IP/per-token rate limiting, bot mitigation, request shaping, caching.
  • Resource exhaustion → autoscaling with guardrails, circuit breakers, bulkheads, queue backpressure, DB connection pooling limits, graceful degradation modes.
  • Noisy neighbor → tenant-level quotas, per-tenant rate limits, resource requests/limits, workload isolation.
  • Dependency DoS → multi-provider DNS option or documented failover, retry budgets, timeouts, fallback auth modes where feasible.

Deliverable: “SC-5 DoS Control Matrix” that includes owner, system component, configuration location, and monitoring signal for each control. (NIST Special Publication 800-53 Revision 5)

3) Implement minimum operating safeguards (what auditors expect to see working)

For each in-scope internet entry point (domain, API gateway, load balancer, VPN), make sure you can show:

  • Traffic filtering and throttling: rate limiting and abuse detection aligned to business logic (not only per-IP; include per-account/API key where applicable).
  • Monitoring that detects DoS conditions: dashboards and alerts for request rate, error rate, latency, saturation, dropped packets, WAF blocks, autoscaling events.
  • Capacity and limit management: documented service limits and quotas; guardrails to prevent runaway autoscaling costs from becoming the outage.
  • Response playbooks: actions to block, challenge, throttle, scale, or shed load; escalation paths to network provider/CDN/DDoS scrubbing third party.
  • Testing: planned load tests and “failure mode” exercises that validate alerting and runbooks.

Deliverable: configuration baselines and an ops runbook that ties signals to actions. (NIST Special Publication 800-53 Revision 5)

4) Bring third parties into the control boundary (contract + technical)

DoS protection often “inherits” controls from third parties (CDN/WAF, DDoS scrubbing). That’s acceptable operationally, but compliance still needs evidence.

Actions:

  • Confirm the third party provides DoS/DDoS protections relevant to your defined event types.
  • Document shared responsibility: what they mitigate vs what you must configure (rules, thresholds, allowlists, challenge pages).
  • Ensure you have incident communications paths and escalation procedures with the third party.

Deliverable: third-party due diligence package and an integration/configuration record showing your settings. (NIST Special Publication 800-53 Revision 5)

5) Make it auditable: write the SC-5 narrative like an operator

Your control description should read like: “We defined DoS types A–F; for each, we use controls X/Y/Z; we monitor signals M; we test quarterly; we review thresholds after incidents or major releases.” Avoid tool lists without how they are configured and operated.

If you use Daydream for third-party risk and evidence management, the fastest win is centralizing the DoS control matrix, third-party attestations, configurations, and runbooks into a single evidence request workflow so audit prep is a retrieval task, not a scavenger hunt.

Required evidence and artifacts to retain

Keep artifacts that prove definition, design, operation, and learning:

Governance / documentation

  • DoS event type definitions and scope statement. (NIST Special Publication 800-53 Revision 5)
  • SC-5 control narrative and control matrix with ownership.
  • Architecture diagrams showing edge protections (CDN/WAF/DDoS), ingress points, and choke points.

Technical configurations

  • WAF policies, rate limit rules, bot rules, allow/deny lists (exported configs or screenshots with change metadata).
  • Load balancer / API gateway throttling settings.
  • Network protections (ACLs/security groups) relevant to DoS.
  • Autoscaling policies and resource quotas.

Operations

  • Monitoring dashboards and alert definitions; sample alerts from test events.
  • Incident runbooks and escalation paths (including third party contacts).
  • Records of tests (load tests, tabletop exercises) and resulting tuning changes.
  • Incident tickets/post-incident reviews where DoS-like symptoms occurred, even if benign (traffic spikes, crawler storms).

Third-party due diligence

  • Evidence of third-party DoS protections and your configured responsibilities.
  • Support/escalation procedures and SLAs (if contractually defined).

Common exam/audit questions and hangups

Expect these questions, and pre-answer them in your evidence pack:

  1. “What DoS events did you define, and why those?” Show your taxonomy and how it maps to your architecture. (NIST Special Publication 800-53 Revision 5)
  2. “Show me your edge protections for each internet entry point.” Auditors often pick one endpoint and walk it end-to-end.
  3. “How do you know it works?” Provide monitoring signals, alerts, and test records.
  4. “Who can change DoS controls, and how are changes reviewed?” Be ready with change management tickets and approvals.
  5. “What happens if your CDN/DDoS provider fails?” Show documented failover or contingency procedures, and how you tested the procedure qualitatively.

Typical hangup: teams have WAF/DDoS services enabled but lack documented thresholds, alerting, or proof of operational ownership.

Frequent implementation mistakes (and how to avoid them)

  • Mistake: Defining DoS only as “DDoS at the network edge.”
    Fix: include app-layer and internal resource exhaustion events, since those cause real outages and are testable. (NIST Special Publication 800-53 Revision 5)

  • Mistake: Rate limits that break real customers.
    Fix: implement tiered limits by identity (user/account/API key), build exception handling, and monitor false positives.

  • Mistake: Noisy-neighbor risk ignored in multi-tenant platforms.
    Fix: enforce tenant quotas, isolate critical workloads, and document the “blast radius” design.

  • Mistake: Relying on third parties without documenting shared responsibility.
    Fix: keep your configuration exports and due diligence artifacts; document what you configured vs what the provider guarantees.

  • Mistake: No evidence of testing.
    Fix: schedule recurring exercises and retain outputs: test plan, results, and tuning decisions. (NIST Special Publication 800-53 Revision 5)

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite specific enforcement actions.

Operationally, SC-5 gaps translate into:

  • Availability failures that can become security incidents and contract nonperformance.
  • Cost spikes during uncontrolled scaling events.
  • Increased incident scope because teams lack throttling, isolation, or practiced runbooks.

Treat SC-5 as both a security control and an uptime control. That framing helps align Security, SRE, and Product on funding and priorities. (NIST Special Publication 800-53 Revision 5)

Practical execution plan (30/60/90-day)

Use this as a sequencing model; adjust to your release calendar and system criticality.

First 30 days (Immediate)

  • Name an SC-5 owner and identify all internet ingress points and critical internal choke points.
  • Publish DoS event type definitions and scope for the FedRAMP boundary. (NIST Special Publication 800-53 Revision 5)
  • Build the SC-5 control matrix with current-state controls and obvious gaps.
  • Confirm third-party dependencies (CDN/WAF/DNS/IdP) and collect existing artifacts.

By 60 days (Near-term)

  • Implement missing baseline protections at highest-risk entry points: rate limiting, WAF policies, and alerting tied to DoS signals.
  • Draft and socialize the DoS response playbook, including third-party escalation steps.
  • Run at least one controlled test (load or tabletop) and tune thresholds based on results.
  • Put configurations under change control and ensure logs/exports are retained.

By 90 days (Operationalize)

  • Expand protections to secondary endpoints and internal resource exhaustion scenarios (DB pools, queues, background workers).
  • Add tenant isolation/quotas if multi-tenant.
  • Produce an “audit-ready” evidence pack: narratives, configs, alerts, test records, and third-party due diligence.
  • Set an ongoing cadence to review DoS events after major releases and after any incident patterns. (NIST Special Publication 800-53 Revision 5)

Frequently Asked Questions

What counts as “organization-defined types of denial-of-service events” for SC-5?

It’s your documented list of DoS scenarios relevant to your system boundary, such as volumetric floods, application request floods, and internal resource exhaustion. Auditors expect the list to map directly to implemented controls. (NIST Special Publication 800-53 Revision 5)

Can we “inherit” DoS protection from a CDN or DDoS scrubbing third party?

You can depend on third-party controls, but you still need evidence of what the third party provides and what you configured. Keep shared-responsibility notes, configurations, and escalation procedures. (NIST Special Publication 800-53 Revision 5)

What evidence is most persuasive in an assessment?

A tight control matrix plus proof of operation: exported configs, alerts, dashboards, runbooks, and records from a test or incident where controls were used. Tool screenshots alone rarely close the loop. (NIST Special Publication 800-53 Revision 5)

Do we need to prove we can stop every DDoS attack?

No. SC-5 focuses on protecting against or limiting effects through defined controls. Your goal is reduced impact and demonstrable operational readiness, not perfect prevention. (NIST Special Publication 800-53 Revision 5)

How do we scope SC-5 for internal-only systems?

Focus on internal DoS vectors: resource exhaustion, noisy-neighbor risks, and dependency failures inside the environment. Document why volumetric internet DDoS is out of scope if there is no internet ingress. (NIST Special Publication 800-53 Revision 5)

How does Daydream help with SC-5 in practice?

Daydream helps you centralize SC-5 evidence across engineering and third parties, track control owners, and run repeatable evidence requests so FedRAMP audit prep becomes a managed workflow rather than ad hoc collection.

Frequently Asked Questions

What counts as “organization-defined types of denial-of-service events” for SC-5?

It’s your documented list of DoS scenarios relevant to your system boundary, such as volumetric floods, application request floods, and internal resource exhaustion. Auditors expect the list to map directly to implemented controls. (NIST Special Publication 800-53 Revision 5)

Can we “inherit” DoS protection from a CDN or DDoS scrubbing third party?

You can depend on third-party controls, but you still need evidence of what the third party provides and what you configured. Keep shared-responsibility notes, configurations, and escalation procedures. (NIST Special Publication 800-53 Revision 5)

What evidence is most persuasive in an assessment?

A tight control matrix plus proof of operation: exported configs, alerts, dashboards, runbooks, and records from a test or incident where controls were used. Tool screenshots alone rarely close the loop. (NIST Special Publication 800-53 Revision 5)

Do we need to prove we can stop every DDoS attack?

No. SC-5 focuses on protecting against or limiting effects through defined controls. Your goal is reduced impact and demonstrable operational readiness, not perfect prevention. (NIST Special Publication 800-53 Revision 5)

How do we scope SC-5 for internal-only systems?

Focus on internal DoS vectors: resource exhaustion, noisy-neighbor risks, and dependency failures inside the environment. Document why volumetric internet DDoS is out of scope if there is no internet ingress. (NIST Special Publication 800-53 Revision 5)

How does Daydream help with SC-5 in practice?

Daydream helps you centralize SC-5 evidence across engineering and third parties, track control owners, and run repeatable evidence requests so FedRAMP audit prep becomes a managed workflow rather than ad hoc collection.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
FedRAMP Moderate: Denial-of-Service Protection | Daydream