AC.L1-B.1.III
External Connections
FCI Data
Security Requirement
Verify and control/limit connections to and use of external information systems.
USU Policy, Procedures, and Standards
University Policy 5200: Information Security and Appropriate Use
Vendors must adhere to access controls and contractual data protection rules; access to external systems must follow the Vendor Management Plan.
NIST Cybersecurity Framework v2
- Protect (PR): PR.AA-05 - Network integrity is protected, and use of external systems is controlled.
Implementation Details
Documentation should include details to meet the Security Requirement for this control. Complete this list for each system or systems that process or access FCI data:
- List processes and controls used to limit and monitor access between internal USU systems and external systems (e.g., internet, cloud services).
- List rules governing the approval and documentation of external connections, including when and how they are reviewed.
- List any additional process or procedures you have that helps meet the control’s security requirement.
Document How
- connections to external systems are identified
- the use of external systems is identified
- connections to external systems are verified
- the use of external systems is verified
- connections to external systems are controlled/limited
- the use of external systems is controlled/limited
Example
Internal systems are configured with private IP addresses managed by USU IT and are separated from the internet using USU Firewalls. Public IP access is not allowed unless explicitly authorized and logged. Remote users are required to use the institutional VPN from university-managed devices.
How might an auditor assess this control?
Method
- Examine:
- Review firewall rules, VPN configurations, and network architecture diagrams to ensure external access is controlled.
- Interview:
- Ask administrators how external connections are approved, configured, and monitored.
- Test:
- Attempt remote access using an unauthorized method or device to confirm enforcement of connection restrictions.
Objects (examples of items you could present to the auditor)
- Firewall Rule Sets: Documentation or exports showing rules for controlling external access.
- Network Diagrams: Visual representation showing how external systems are segmented from internal systems.
- VPN Configuration: Details showing how the Institutional VPN solution is configured to restrict access.
- Access Logs: Logs showing attempted and successful external connections.
- External Connection Approvals: Records of who approved external system access and for what purpose.
- IPS Reports: Alerts or findings that demonstrate active monitoring of inbound/outbound traffic.