SC-7(17)—Boundary Protection
Technical
>Control Description
BOUNDARY PROTECTION | AUTOMATED ENFORCEMENT OF PROTOCOL FORMATS The information system enforces adherence to protocol formats.
>Supplemental Guidance
Information system components that enforce protocol formats include, for example, deep packet inspection firewalls and XML gateways. Such system components verify adherence to protocol formats/specifications (e.g., IEEE) at the application layer and identify significant vulnerabilities that cannot be detected by devices operating at the network or transport layers. Related control: SC-4.
>Tailoring Guidance
This security control/enhancement specifies a very specialized and/or advanced capability that is not required for all systems. Consequently, inclusion in a departmental profile is made on a case by case basis.
Ask AI
Configure your API key to use AI features.