STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

SC-7 (11)

System and Communications ProtectionRev 5system

Restrict Incoming Communications Traffic

Control Statement

Only allow incoming communications from [Assignment: authorized sources] to be routed to [Assignment: authorized destinations].

Supplemental Guidance

General source address validation techniques are applied to restrict the use of illegal and unallocated source addresses as well as source addresses that should only be used within the system. The restriction of incoming communications traffic provides determinations that source and destination address pairs represent authorized or allowed communications. Determinations can be based on several factors, including the presence of such address pairs in the lists of authorized or allowed communications, the absence of such address pairs in lists of unauthorized or disallowed pairs, or meeting more general rules for authorized or allowed source and destination pairs. Strong authentication of network addresses is not possible without the use of explicit security protocols, and thus, addresses can often be spoofed. Further, identity-based incoming traffic restriction methods can be employed, including router access control lists and firewall rules.

Related Controls (1)

AC-3

CCI Identifiers (4)

CCI-001117The information system checks incoming communications to ensure the communications are coming from an authorized source and routed to an authorized destination.CCI-002401Defines the authorized sources from which the system will allow incoming communications.CCI-002402Defines the authorized destinations for routing inbound communications.CCI-002403Only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.

Linked STIG Checks (200)

Across 38 STIGs. Click to expand.