SC.L1-B.1.X
Boundary Protection
FCI Data
Security Requirement
Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.
USU Policy, Procedures, and Standards
University Policy 5200: Information Security and Appropriate Use
- Section 2.2 - Appropriate Use and Terms of Use
- Section 2.3 - Device and Endpoint Management and Security
- Section 3.3 - Information Technology and IT Staff
Policy refers to control of devices and accountability for protecting IT resources from unauthorized access.
University Policy 2402: Public Safety, Response, and Reporting
USU manages building access according to the building type and purpose and considers security in the maintenance of campus facilities.
NIST Cybersecurity Framework v2
- Protect (PR): PR.PS-03 - Physical access logs are maintained and reviewed.
Implementation Details
Documentation should include details to meet the Security Requirement for this control. Complete this list for each system or systems that process or access FCI data:
- List how external system communications are monitored and controlled (e.g., firewalls, network segmentation).
- List how inbound and outbound network traffic is filtered or logged.
- List which systems are in place to protect network perimeters and detect unauthorized connections.
- List any additional measures for protecting internal boundaries between systems or networks.
Document How
- the external system boundary is defined
- key internal system boundaries are defined
- communications are monitored at the external system boundary
- communications are monitored at key internal boundaries
Example
All FCI systems reside in a segmented network protected by Enterprise firewall and intrusion prevention system. Default deny rules are used at all network boundaries. Inbound and outbound connections are explicitly defined and logged. Internal VLAN segmentation limits lateral movement. USU's network monitoring and IPS tools continuously scan for anomalies. Firewall rule changes must be reviewed and approved by network security staff.
How might an auditor assess this control?
Method
- Examine:
- Review network architecture diagrams, firewall configurations, and logs of boundary activity.
- Interview:
- Ask network security staff how external traffic is monitored and filtered.
- Test:
- Attempt to access internal systems from an unauthorized external network or review logging/alerting from simulated unauthorized attempts.
Objects (examples of items you could present to the auditor)
- Firewall Rule Documentation: Showing traffic filtering and default deny configurations.
- Network Diagrams: Highlighting boundary controls and internal segmentation.
- IPS Reports: Output from intrusion prevention systems showing blocked traffic.
- Traffic Logs: Firewall or network logs demonstrating monitoring at boundaries.
- Change Approval Records: Documentation of firewall or rule changes and approvals.
- Alerting Configuration: Screenshots or rules showing boundary anomaly detection.