Under active development Content is continuously updated and improved

SC-7(13)Boundary Protection

PBMM (P2)
Secret (P2)
Technical

>Control Description

BOUNDARY PROTECTION | ISOLATION OF SECURITY TOOLS / MECHANISMS / SUPPORT COMPONENTS The organization isolates organization-defined information security tools, mechanisms, and support components from other internal information system components by implementing physically separate sub-networks with managed interfaces to other components of the system.

>Supplemental Guidance

Physically separate sub-networks with managed interfaces are useful, for example, in isolating computer network defences from critical operational processing networks to prevent adversaries from discovering the analysis and forensics techniques of organizations. Related controls: SA-8, SC-2, SC-3.

>Tailoring Guidance

This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. This security control/enhancement can be met through the use of a dedicated management zone.

Ask AI

Configure your API key to use AI features.