SC-7(13)—Boundary Protection
PBMM (P2)
Secret (P2)
Technical
>Control Description
BOUNDARY PROTECTION | ISOLATION OF SECURITY TOOLS / MECHANISMS / SUPPORT COMPONENTS The organization isolates ⚙organization-defined information security tools, mechanisms, and support components from other internal information system components by implementing physically separate sub-networks with managed interfaces to other components of the system.
>Supplemental Guidance
Physically separate sub-networks with managed interfaces are useful, for example, in isolating computer network defences from critical operational processing networks to prevent adversaries from discovering the analysis and forensics techniques of organizations. Related controls: SA-8, SC-2, SC-3.
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. This security control/enhancement can be met through the use of a dedicated management zone.
Ask AI
Configure your API key to use AI features.