SC-7(11)—Boundary Protection
PBMM (P2)
Secret (P2)
Technical
>Control Description
BOUNDARY PROTECTION | RESTRICT INCOMING COMMUNICATIONS TRAFFIC The information system only allows incoming communications from ⚙organization-defined authorized sources routed to ⚙organization-defined authorized destinations.
>Supplemental Guidance
This control enhancement provides determinations that source and destination address pairs represent authorized/allowed communications. Such determinations can be based on several factors including, for example, the presence of source/destination address pairs in lists of authorized/allowed communications, the absence of address pairs in lists of unauthorized/disallowed pairs, or meeting more general rules for authorized/allowed source/destination pairs. Related control: AC-3.
>Tailoring Guidance
This security control/enhancement should be addressed where applicable and if practical to do so.
Ask AI
Configure your API key to use AI features.