STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← SC-7 (4) — Boundary Protection

CCI-002396

Definition

Protect the confidentiality and integrity of the information being transmitted across each interface for each external telecommunication service.

Parent Control

SC-7 (4)Boundary ProtectionSystem and Communications Protection

Linked STIG Checks (3)

V-251349CAT ITunneling of classified traffic across an unclassified IP transport network or service provider backbone must be documented in the enclaves security authorization package and an Approval to Connect (ATC), or an Interim ATC must be issued by DISA prior to implementation.Network Infrastructure Policy Security Technical Implementation GuideV-251350CAT IDSAWG approval must be obtained before tunneling classified traffic outside the components local area network boundaries across a non-DISN or OCONUS DISN unclassified IP wide area network transport infrastructure.Network Infrastructure Policy Security Technical Implementation GuideV-251351CAT ITunneling of classified traffic across an unclassified IP transport network must employ cryptographic algorithms in accordance with CNSS Policy No. 15.Network Infrastructure Policy Security Technical Implementation Guide