3.13.1

  • Requirement

    a. Monitor and control communications at external managed interfaces to the system and key internal managed interfaces within the system.
    b. Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
    c. Connect to external systems only through managed interfaces that consist of boundary protection devices arranged in accordance with an organizational security architecture.

  • Discussion

    Managed interfaces include gateways, routers, firewalls, network-based malicious code analysis, virtualization systems, and encrypted tunnels implemented within a security architecture. Subnetworks that are either physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational systems includes restricting external web traffic to designated web servers within managed interfaces, prohibiting external traffic that appears to be spoofing internal addresses, and prohibiting internal traffic that appears to be spoofing external addresses.

More Info

  • Family

    System and Communications Protection
  • Related NIST 800-53 ID

    SC-07
  • Reference Documents

    • N/A

NIST 800-171A r3 Assessment Guidance

CMMC Training

Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!