IVS-03: Network Security

PF v1.0 References:

Previous Version:

Control Statement

Monitor, encrypt and restrict communications between environments to only authenticated and authorized connections, as justified by the business. Review these configurations at least annually, and support them by a documented justification of all allowed services, protocols, ports, and compensating controls.

Implementation Guidance

Network communications justified by the business should be allowed, encrypted, and require authorization. Conversely, unjustified network communications should be disallowed. Container application-aware network monitoring tools should be leveraged for:

  1. Automated determination of proper container networking surfaces, including both inbound ports and process-port bindings.
  2. Detection of traffic flows between containers and other network entities over both wire traffic and encapsulated traffic.
  3. Detection of network anomalies—such as unexpected traffic flows within the organization’s network, port scanning, or outbound access to potentially dangerous destinations.
  4. Detection of invalid or unexpected malicious processes—and data they introduce into the environment.

Auditing Guidance

  1. Examine the policy for communication between environments.
  2. Examine the criteria for business justification of communication, and reviews.
  3. Determine if the inventory of allowed communication has been reviewed, at least annually.
  4. Evaluate the effectiveness of the monitoring and encryption of such communication.
  5. Evaluate the details of business justification, and its review.

[csf.tools Note: For more information on the Cloud Controls Matrix, visit the CSA Cloud Controls Matrix Homepage.]

Cloud Control Matrix is Copyright 2023 Cloud Security Alliance.