Open Compton-US opened 2 years ago
SC BOUNDARY PROTECTION enhancements to be considered for selection.
SC-7(3) BOUNDARY PROTECTION | ACCESS POINTS Limit the number of external network connections to the system.
SC-7(4) BOUNDARY PROTECTION | EXTERNAL TELECOMMUNICATIONS SERVICES Manage external communication services.
SC-7(5) BOUNDARY PROTECTION | DENY BY DEFAULT — ALLOW BY EXCEPTION Implement a deny-all, permit-by-exception network communications traffic policy.
SC-7(7) BOUNDARY PROTECTION | SPLIT TUNNELING FOR REMOTE DEVICES Prevent split tunneling for remote devices connecting to organizational systems unless the split tunnel is securely provisioned using safeguards.
SC-7(8) BOUNDARY PROTECTION | ROUTE TRAFFIC TO AUTHENTICATED PROXY SERVERS Route internal traffic to external networks through authenticated proxy servers at managed interfaces.
Document the plan of implementation for each component identified in the Component Definition Issue. Work content into a snippet for the OSCAL model.