💼 SC-7(11) Boundary Protection | Restrict Incoming Communications Traffic
- ID:
/frameworks/nist-sp-800-53-r5/sc/07/11
Description
Only allow incoming communications from [Assignment: organization-defined authorized sources] to be routed to [Assignment: organization-defined authorized destinations].
Similar
- Sections
/frameworks/aws-fsbp-v1.0.0/auto-scaling/05/frameworks/aws-fsbp-v1.0.0/cloudfront/01/frameworks/aws-fsbp-v1.0.0/dms/01/frameworks/aws-fsbp-v1.0.0/documentdb/03/frameworks/aws-fsbp-v1.0.0/ec2/01/frameworks/aws-fsbp-v1.0.0/ec2/02/frameworks/aws-fsbp-v1.0.0/ec2/09/frameworks/aws-fsbp-v1.0.0/ec2/10/frameworks/aws-fsbp-v1.0.0/ec2/15/frameworks/aws-fsbp-v1.0.0/ec2/18/frameworks/aws-fsbp-v1.0.0/ec2/19/frameworks/aws-fsbp-v1.0.0/ec2/25/frameworks/aws-fsbp-v1.0.0/ec2/55/frameworks/aws-fsbp-v1.0.0/ec2/56/frameworks/aws-fsbp-v1.0.0/ec2/57/frameworks/aws-fsbp-v1.0.0/ec2/58/frameworks/aws-fsbp-v1.0.0/ec2/60/frameworks/aws-fsbp-v1.0.0/ecs/02/frameworks/aws-fsbp-v1.0.0/eks/01/frameworks/aws-fsbp-v1.0.0/elasticache/07/frameworks/aws-fsbp-v1.0.0/emr/01/frameworks/aws-fsbp-v1.0.0/emr/02/frameworks/aws-fsbp-v1.0.0/es/02/frameworks/aws-fsbp-v1.0.0/lambda/01/frameworks/aws-fsbp-v1.0.0/neptune/03/frameworks/aws-fsbp-v1.0.0/network-firewall/06/frameworks/aws-fsbp-v1.0.0/opensearch/02/frameworks/aws-fsbp-v1.0.0/rds/01/frameworks/aws-fsbp-v1.0.0/rds/02/frameworks/aws-fsbp-v1.0.0/rds/23/frameworks/aws-fsbp-v1.0.0/redshift/01/frameworks/aws-fsbp-v1.0.0/redshift/07/frameworks/aws-fsbp-v1.0.0/s3/01/frameworks/aws-fsbp-v1.0.0/s3/02/frameworks/aws-fsbp-v1.0.0/s3/03/frameworks/aws-fsbp-v1.0.0/s3/19/frameworks/aws-fsbp-v1.0.0/sagemaker/01/frameworks/aws-fsbp-v1.0.0/sagemaker/02/frameworks/aws-fsbp-v1.0.0/ssm/04/frameworks/aws-fsbp-v1.0.0/waf/02/frameworks/aws-fsbp-v1.0.0/waf/03/frameworks/aws-fsbp-v1.0.0/waf/08
- Internal
- ID:
dec-c-78c0a671
- ID:
Similar Sections (Take Policies From)
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|