SC-7: Boundary Protection

CSF v1.1 References:

Threats Addressed:

Baselines:

Previous Version:

Control Statement

  1. Monitor and control communications at the external managed interfaces to the system and at key internal managed interfaces within the system;
  2. Implement subnetworks for publicly accessible system components that are [Assignment: physically, logically] separated from internal organizational networks; and
  3. Connect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security and privacy architecture.

Supplemental Guidance

Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture. Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational systems includes restricting external web traffic to designated web servers within managed interfaces, prohibiting external traffic that appears to be spoofing internal addresses, and prohibiting internal traffic that appears to be spoofing external addresses. Commercial telecommunications services are provided by network components and consolidated management systems shared by customers. These services may also include third party-provided access lines and other service elements. Such services may represent sources of increased risk despite contract security provisions. Boundary protection may be implemented as a common control for all or part of an organizational network such that the boundary to be protected is greater than a system-specific boundary (i.e., an authorization boundary).

Control Enhancements

SC-7(4): External Telecommunications Services

Baseline(s):

  • Moderate
  • High

Implement a managed interface for each external telecommunication service; Establish a traffic flow policy for each managed interface; Protect the confidentiality and integrity of the information being transmitted across each interface; Document each exception to the traffic flow policy with a supporting mission or business need and duration of that need; Review exceptions to the…

SC-7(5): Deny by Default – Allow by Exception

Baseline(s):

  • Moderate
  • High

Deny network communications traffic by default and allow network communications traffic by exception [Assignment (one or more): at managed interfaces, for [Assignment: organization-defined systems] ].

SC-7(7): Split Tunneling for Remote Devices

Baseline(s):

  • Moderate
  • High

Prevent split tunneling for remote devices connecting to organizational systems unless the split tunnel is securely provisioned using [Assignment: organization-defined safeguards].

SC-7(10): Prevent Exfiltration

Baseline(s):

(Not part of any baseline)

Prevent the exfiltration of information; and Conduct exfiltration tests [Assignment: organization-defined frequency].

SC-7(11): Restrict Incoming Communications Traffic

Baseline(s):

(Not part of any baseline)

Only allow incoming communications from [Assignment: organization-defined authorized sources] to be routed to [Assignment: organization-defined authorized destinations].

SC-7(12): Host-based Protection

Baseline(s):

(Not part of any baseline)

Implement [Assignment: organization-defined host-based boundary protection mechanisms] at [Assignment: organization-defined system components].

SC-7(15): Networked Privileged Accesses

Baseline(s):

(Not part of any baseline)

Route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing.

SC-7(18): Fail Secure

Baseline(s):

  • High

Prevent systems from entering unsecure states in the event of an operational failure of a boundary protection device.

SC-7(21): Isolation of System Components

Baseline(s):

  • High

Employ boundary protection mechanisms to isolate [Assignment: organization-defined system components] supporting [Assignment: organization-defined missions and/or business functions].

SC-7(24): Personally Identifiable Information

Baseline(s):

  • Privacy

For systems that process personally identifiable information: Apply the following processing rules to data elements of personally identifiable information: [Assignment: organization-defined processing rules]; Monitor for permitted processing at the external interfaces to the system and at key internal boundaries within the system; Document each processing exception; and Review and remove exceptions that are no longer…

SC-7(25): Unclassified National Security System Connections

Baseline(s):

(Not part of any baseline)

Prohibit the direct connection of [Assignment: organization-defined unclassified national security system] to an external network without the use of [Assignment: organization-defined boundary protection device].

SC-7(27): Unclassified Non-national Security System Connections

Baseline(s):

(Not part of any baseline)

Prohibit the direct connection of [Assignment: organization-defined unclassified non-national security system] to an external network without the use of [Assignment: organization-defined boundary protection device].

SC-7(29): Separate Subnets to Isolate Functions

Baseline(s):

(Not part of any baseline)

Implement [Assignment: physically, logically] separate subnetworks to isolate the following critical system components and functions: [Assignment: organization-defined critical system components and functions].