NIST Controls
ADR-0019 · Author: Sybil Melton · Date: 2025-02-07 · Products: platform
Originally
Originally
0036_nist-controls (v4) · Source on Confluence ↗| Security Function | Control | NIST 800-53 Control | |
|---|---|---|---|
| Detect | SYSTEM MONITORING INBOUND AND OUTBOUND COMMUNICATIONS TRAFFIC | SI-4 SI-4(4) |
|
| Detect | SYSTEM MONITORING - ANALYZE TRAFFIC AND COVERT EXFILTRATION | SI-4(18) | Analyze outbound communications traffic at external interfaces to the system and at the following interior points to detect covert exfiltration of information:
|
| Detect | SYSTEM MONITORING - UNAUTHORIZED NETWORK SERVICES | SI-4(22) |
|
| Protect | DENIAL-OF-SERVICE PROTECTION - RESTRICT ABILITY TO ATTACK OTHER SYSTEMS | SC-5(1) |
|
| Protect | BOUNDARY PROTECTION - ACCESS POINTS | SC-7(3) | Limit the number of external network connections to the system. |
| Protect | BOUNDARY PROTECTION - DENY BY DEFAULT — ALLOW BY EXCEPTION | SC-7(5) | Deny network communications traffic by default and allow network communications traffic by exception [Selection (one or more): at managed interfaces; for [Assignment: organization-defined systems]]. |
| Protect | BOUNDARY PROTECTION - ROUTE TRAFFIC TO AUTHENTICATED PROXY SERVERS | SC-7(8) | Route [Assignment: organization-defined internal communications traffic] to [Assignment: organization-defined external networks] through authenticated proxy servers at managed interfaces. |
| Protect | BOUNDARY PROTECTION - RESTRICT THREATENING OUTGOING COMMUNICATIONS TRAFFIC | SC-7(9) |
|
| Protect | BOUNDARY PROTECTION - PREVENT EXFILTRATION | SC-7(10) |
|
| Protect | BOUNDARY PROTECTION - RESTRICT INCOMING COMMUNICATIONS TRAFFIC | SC-7(11) | Only allow incoming communications from [Assignment: organization-defined authorized sources] to be routed to [Assignment: organization-defined authorized destinations] |
| Protect | BOUNDARY PROTECTION - AUTOMATED ENFORCEMENT OF PROTOCOL FORMATS | SC-7(17) | System components that enforce protocol formats include deep packet inspection firewalls and XML gateways. The components verify adherence to protocol formats and specifications at the application layer and identify vulnerabilities that cannot be detected by devices operating at the network or transport layers. |
| Protect | BOUNDARY PROTECTION - FAIL SECURE | SC-7(18) | Prevent systems from entering unsecure states in the event of an operational failure of a boundary protection device. |
| Protect | BOUNDARY PROTECTION - CONNECTIONS TO PUBLIC NETWORKS | SC-7(28) | Prohibit the direct connection of [Assignment: organization-defined system] to a public network. |
Last updated on