To illustrate the application of these guidelines, let's consider our own website's experience with implementing them. We'll use this real-world example to demonstrate the process of evaluating guidelines.
Our website is a service for external Users. The Users are external to the system (that is, they are not considered part of the system.) Website staff, on the other hand, are part of the system.
The guidelines and supplementals often refer to users or capabilities of a system. For example:
When looking at this from the point of view of a security analyst, we have the following concerns:
The users provide their own computers and browsers, and we don't know and don't control what else they do with their computers.
A potential requirement could be worded to accept system use of external storage (for example for backups), but this conflicts with the prohibition in the guidance.
After considering these points we decide this guidance is not applicable for our website, and mark it "Inapplicable."
We've found that AC 20(4) is not applicable to our website due to its focus on internal systems.
When reviewing guidelines for your own systems and organizations, it's worthwhile considering the focus of each guideline and how well it aligns with the needs of your system.