Under active development Content is continuously updated and improved

SC-7(11)Boundary Protection

PBMM (P2)
Secret (P2)
Technical

>Control Description

BOUNDARY PROTECTION | RESTRICT INCOMING COMMUNICATIONS TRAFFIC The information system only allows incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.

>Supplemental Guidance

This control enhancement provides determinations that source and destination address pairs represent authorized/allowed communications. Such determinations can be based on several factors including, for example, the presence of source/destination address pairs in lists of authorized/allowed communications, the absence of address pairs in lists of unauthorized/disallowed pairs, or meeting more general rules for authorized/allowed source/destination pairs. Related control: AC-3.

>Tailoring Guidance

This security control/enhancement should be addressed where applicable and if practical to do so.

Ask AI

Configure your API key to use AI features.