SC-7(4)—Boundary Protection
PBMM (P2)
Secret (P2)
Technical
>Control Description
BOUNDARY PROTECTION | EXTERNAL TELECOMMUNICATIONS SERVICES (a) The organization implements a managed interface for each external telecommunication service; (b) The organization establishes a traffic flow policy for each managed interface; (c) The organization protects the confidentiality and integrity of the information being transmitted across each interface; (d) The organization documents each exception to the traffic flow policy with a supporting mission/business need and duration of that need; and (e) The organization reviews exceptions to the traffic flow policy ⚙organization-defined frequency and removes exceptions that are no longer supported by an explicit mission/business need.
>Supplemental Guidance
Related control: SC-8.
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.
>Profile-Specific Parameters
(4)(e) frequency [at a frequency no longer than annually]
Ask AI
Configure your API key to use AI features.