Open adammontville opened 5 years ago
NOTES: Two ways to approach this. First is the method UNCC offers - active testing using spoofed packets. Second is checking the running config. Active testing seems more outcome-focused, so we can try for that first.
Deny communications with known malicious or unused Internet IP addresses and limit access only to trusted and necessary IP address ranges at each of the organization's network boundaries.
Sub-control Notes:
Inputs:
Operations:
Measures:
Metrics:
INPUT
Measured
Metric
Ration of network boundary devices that complies with this subcontrol (quality of firewall screening ) = M1/M2
Deny communications with known malicious or unused Internet IP addresses and limit access only to trusted and necessary IP address ranges at each of the organization's network boundaries.
Per 2019-08-14 discussion: Make this more of a level 1 measure than a level 2 measure.
Inputs:
Operations:
Measures:
Metrics:
Deny communications with known malicious or unused Internet IP addresses and limit access only to trusted and necessary IP address ranges at each of the organization's network boundaries.
Measures
Metrics