Under active development Content is continuously updated and improved

SC-7(8)Boundary Protection

PBMM (P2)
Secret (P2)
Technical

>Control Description

BOUNDARY PROTECTION | ROUTE TRAFFIC TO AUTHENTICATED PROXY SERVERS The information system routes organization-defined internal communications traffic to organization-defined external networks through authenticated proxy servers at managed interfaces.

>Supplemental Guidance

External networks are networks outside of organizational control. A proxy server is a server (i.e., information system or application) that acts as an intermediary for clients requesting information system resources (e.g., files, connections, web pages, or services) from other organizational servers. Client requests established through an initial connection to the proxy server are evaluated to manage complexity and to provide additional protection by limiting direct connectivity.

Web content filtering devices are one of the most common proxy servers providing access to the Internet. Proxy servers support logging individual Transmission Control Protocol (TCP) sessions and blocking specific Uniform Resource Locators (URLs), domain names, and Internet Protocol (IP) addresses. Web proxies can be configured with organization-defined lists of authorized and unauthorized websites.

Related controls: AC-3, AU-2.

>Profile-Specific Parameters

(8) list [list of communications traffic] (8) list [list of external networks]

Ask AI

Configure your API key to use AI features.