STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

SC-7

System and Communications ProtectionRev 5system

Boundary Protection

Baselines:LowModerateHigh

Control Statement

a. Monitor and control communications at the external managed interfaces to the system and at key internal managed interfaces within the system; b. Implement subnetworks for publicly accessible system components that are [Selection: organization-defined value] separated from internal organizational networks; and c. Connect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security and privacy architecture.

Supplemental Guidance

Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture. Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational systems includes restricting external web traffic to designated web servers within managed interfaces, prohibiting external traffic that appears to be spoofing internal addresses, and prohibiting internal traffic that appears to be spoofing external addresses. [SP 800-189](#f5edfe51-d1f2-422e-9b27-5d0e90b49c72) provides additional information on source address validation techniques to prevent ingress and egress of traffic with spoofed addresses. Commercial telecommunications services are provided by network components and consolidated management systems shared by customers. These services may also include third party-provided access lines and other service elements. Such services may represent sources of increased risk despite contract security provisions. Boundary protection may be implemented as a common control for all or part of an organizational network such that the boundary to be protected is greater than a system-specific boundary (i.e., an authorization boundary).

Related Controls (25)

AC-4AC-17AC-18AC-19AC-20AU-13CA-3CM-2CM-4CM-7CM-10CP-8CP-10IR-4MA-4PE-3PL-8PM-12SA-8SA-17SC-5

CCI Identifiers (6)

CCI-001658The organization defines key internal boundaries of the information system.CCI-001097Monitor and control communications at the external managed interfaces to the system and at key managed interfaces within the system.CCI-001098Connect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.CCI-004868Connect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational privacy architecture.CCI-002395Implement subnetworks for publicly accessible system components that are physically and/or logically separated from internal organizational networks.CCI-001657The organization defines the external boundary of the information system.

Linked STIG Checks (185)

Across 35 STIGs. Click to expand.

SC-26
SC-32
SC-35
SC-43