Under active development Content is continuously updated and improved

SC-7(17)Boundary Protection

Technical

>Control Description

BOUNDARY PROTECTION | AUTOMATED ENFORCEMENT OF PROTOCOL FORMATS The information system enforces adherence to protocol formats.

>Supplemental Guidance

Information system components that enforce protocol formats include, for example, deep packet inspection firewalls and XML gateways. Such system components verify adherence to protocol formats/specifications (e.g., IEEE) at the application layer and identify significant vulnerabilities that cannot be detected by devices operating at the network or transport layers. Related control: SC-4.

>Tailoring Guidance

This security control/enhancement specifies a very specialized and/or advanced capability that is not required for all systems. Consequently, inclusion in a departmental profile is made on a case by case basis.

Ask AI

Configure your API key to use AI features.