NO-02—Inbound and Outbound Network Traffic: DMZ Requirements
>Control Description
Theme
Type
Policy/Standard
Network Security Standard>Implementation Guidance
1. Ensure necessary requirements are defined which outlines the use of a DMZ and firewalls must be used wherever necessary to enforce perimeter security between separate networks in the policy. 2. Ensure DMZ is enabled and configured within the network traffic.
>Testing Procedure
1. Inspect Network Security Policy and/or Standard documents to determine whether requirements have been defined that outlines the use of a DMZ and firewalls must be used wherever necessary to enforce perimeter security between separate networks. 2. Observe a sample of network security rules or firewall rulesets and confirm that the DMZ or DMZ equivalents are operating in the rulesets.
>Audit Artifacts
>Framework Mappings
Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.
Ask AI
Configure your API key to use AI features.