Under active development Content is continuously updated and improved

SC-7(4)Boundary Protection

PBMM (P2)
Secret (P2)
Technical

>Control Description

BOUNDARY PROTECTION | EXTERNAL TELECOMMUNICATIONS SERVICES (a) The organization implements a managed interface for each external telecommunication service; (b) The organization establishes a traffic flow policy for each managed interface; (c) The organization protects the confidentiality and integrity of the information being transmitted across each interface; (d) The organization documents each exception to the traffic flow policy with a supporting mission/business need and duration of that need; and (e) The organization reviews exceptions to the traffic flow policy organization-defined frequency and removes exceptions that are no longer supported by an explicit mission/business need.

>Supplemental Guidance

Related control: SC-8.

>Tailoring Guidance

This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.

>Profile-Specific Parameters

(4)(e) frequency [at a frequency no longer than annually]

Ask AI

Configure your API key to use AI features.