Under active development Content is continuously updated and improved

NO-03Ingress and Egress Points

>Control Description

Organization maintains an inventory of ingress and egress points on the production network and performs the following for each: • inventory is reduced to the minimum possible level • permitted ports, protocols and services are inventoried and validated • documents security features that are implemented for insecure protocols

Theme

Process

Type

Preventive

Policy/Standard

Network Security Standard

>Implementation Guidance

1. Ensure a process is maintained for inventory of ingress and egress points on the production network 2. Ensure network security rules are defined and established with the following: • permitted ports, protocols and services are inventoried and validated • documented security features that are implemented for insecure protocols

>Testing Procedure

1. Observe the inventory of ingress and egress points on the production network. 2. Observe network security rules and validate to ensure no insecure ports, protocols, and services are present. 3. If applicable, for any insecure ports, protocols, and services, ensure that additional security features are in place.

>Audit Artifacts

E-NO-04
E-NO-05

>Framework Mappings

Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.

Ask AI

Configure your API key to use AI features.