usnistgov / blossom-oscal

OSCAL content that supports the BloSS@M project.
10 stars 7 forks source link

OSCAL SSP Content: SC-7 Boundary protection #28

Open Compton-US opened 2 years ago

Compton-US commented 2 years ago

Document the plan of implementation for each component identified in the Component Definition Issue. Work content into a snippet for the OSCAL model.

nbg84 commented 2 years ago

SC BOUNDARY PROTECTION enhancements to be considered for selection.

SC-7(3) BOUNDARY PROTECTION | ACCESS POINTS Limit the number of external network connections to the system.

SC-7(4) BOUNDARY PROTECTION | EXTERNAL TELECOMMUNICATIONS SERVICES Manage external communication services.

SC-7(5) BOUNDARY PROTECTION | DENY BY DEFAULT — ALLOW BY EXCEPTION Implement a deny-all, permit-by-exception network communications traffic policy.

SC-7(7) BOUNDARY PROTECTION | SPLIT TUNNELING FOR REMOTE DEVICES Prevent split tunneling for remote devices connecting to organizational systems unless the split tunnel is securely provisioned using safeguards.

SC-7(8) BOUNDARY PROTECTION | ROUTE TRAFFIC TO AUTHENTICATED PROXY SERVERS Route internal traffic to external networks through authenticated proxy servers at managed interfaces.