Skip to main content

πŸ’Ό SC-7 BOUNDARY PROTECTION

Description​

The information system: SC-7a. Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system; SC-7b. Implements subnetworks for publicly accessible system components that are [Selection: physically; logically] separated from internal organizational networks; and SC-7c. Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.

Similar​

  • Internal
    • ID: dec-c-537a8fb7

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.CM-1: The network is monitored to detect potential cybersecurity events1928
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.AC-5: Network integrity is protected (e.g., network segregation, network segmentation)713
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.DS-5: Protections against data leaks are implemented4351
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.PT-4: Communications and control networks are protected713

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό SC-7 (1) PHYSICALLY SEPARATED SUBNETWORKS
πŸ’Ό SC-7 (2) PUBLIC ACCESS
πŸ’Ό SC-7 (3) ACCESS POINTS
πŸ’Ό SC-7 (4) EXTERNAL TELECOMMUNICATIONS SERVICES
πŸ’Ό SC-7 (5) DENY BY DEFAULT _ ALLOW BY EXCEPTION
πŸ’Ό SC-7 (6) RESPONSE TO RECOGNIZED FAILURES
πŸ’Ό SC-7 (7) PREVENT SPLIT TUNNELING FOR REMOTE DEVICES
πŸ’Ό SC-7 (8) ROUTE TRAFFIC TO AUTHENTICATED PROXY SERVERS
πŸ’Ό SC-7 (9) RESTRICT THREATENING OUTGOING COMMUNICATIONS TRAFFIC
πŸ’Ό SC-7 (10) PREVENT UNAUTHORIZED EXFILTRATION
πŸ’Ό SC-7 (11) RESTRICT INCOMING COMMUNICATIONS TRAFFIC
πŸ’Ό SC-7 (12) HOST-BASED PROTECTION
πŸ’Ό SC-7 (13) ISOLATION OF SECURITY TOOLS _ MECHANISMS _ SUPPORT COMPONENTS
πŸ’Ό SC-7 (14) PROTECTS AGAINST UNAUTHORIZED PHYSICAL CONNECTIONS
πŸ’Ό SC-7 (15) ROUTE PRIVILEGED NETWORK ACCESSES
πŸ’Ό SC-7 (16) PREVENT DISCOVERY OF COMPONENTS _ DEVICES
πŸ’Ό SC-7 (17) AUTOMATED ENFORCEMENT OF PROTOCOL FORMATS
πŸ’Ό SC-7 (18) FAIL SECURE
πŸ’Ό SC-7 (19) BLOCKS COMMUNICATION FROM NON-ORGANIZATIONALLY CONFIGURED HOSTS
πŸ’Ό SC-7 (20) DYNAMIC ISOLATION _ SEGREGATION
πŸ’Ό SC-7 (21) ISOLATION OF INFORMATION SYSTEM COMPONENTS
πŸ’Ό SC-7 (22) SEPARATE SUBNETS FOR CONNECTING TO DIFFERENT SECURITY DOMAINS
πŸ’Ό SC-7 (23) DISABLE SENDER FEEDBACK ON PROTOCOL VALIDATION FAILURE

Policies (6)​

PolicyLogic CountFlags
πŸ“ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MongoDB 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS 🟒1🟒 x6
πŸ“ AWS S3 Bucket is not configured to block public access 🟒1🟒 x6
πŸ“ AWS S3 Bucket Policy is not set to deny HTTP requests 🟒1🟒 x6

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-637372481
βœ‰οΈ dec-x-bcae85fb2
βœ‰οΈ dec-x-d5fbfc401
βœ‰οΈ dec-x-ec547a7c1
βœ‰οΈ dec-z-c82c9f971