3.13.5: Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks

Control Type:

Derived

CSF v1.1 References:

Discussion

Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones (DMZs). DMZs are typically implemented with boundary control devices and techniques that include routers, gateways, firewalls, virtualization, or cloud-based technologies.

[SP 800-41] provides guidance on firewalls and firewall policy. [SP 800-125B] provides guidance on security for virtualization technologies.