SC.L1-B.1.XI
Public-access System Separation
FCI Data
Security Requirement
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
USU Policy, Procedures, and Standards
University Policy 5200: Information Security and Appropriate Use
- Section 2.2 - Appropriate Use and Terms of Use
- Section 2.3 - Device and Endpoint Management and Security
- Section 3.3 - Information Technology and IT Staff
Policy refers to control of devices and accountability for protecting IT resources from unauthorized access.
University Policy 2402: Public Safety, Response, and Reporting
USU manages building access according to the building type and purpose and considers security in the maintenance of campus facilities.
NIST Cybersecurity Framework v2
- Protect (PR): PR.PS-04 - Physical access devices are inventoried and managed.
Implementation Details
Documentation should include details to meet the Security Requirement for this control. Complete this list for each system or systems that process or access FCI data:
- List which public-facing systems (e.g., web servers) are logically or physically separated from internal FCI systems.
- List how this separation is implemented (e.g., VLANs, DMZ, separate cloud tenancy).
- List who is responsible for approving and reviewing separation of public and internal systems.
- List any additional protections in place to reduce the risk of public systems exposing internal data.
Document How
- publicly accessible system components are identified
- subnetworks for publicly accessible system components are physically or logically separated from internal networks
Example
Public-facing systems such as the university's main website and event platforms are hosted in a network that is separated from internal academic and administrative networks. Firewall rules and routing controls prevent public systems from initiating connections to internal FCI systems. System logs and alerts are configured to detect and report any anomalous behavior at network boundaries.
How might an auditor assess this control?
Method
- Examine:
- Review network diagrams, VLAN configurations, firewall rules, and public system inventories.
- Interview:
- Ask system and network admins how public systems are segmented and how that separation is maintained.
- Test:
- Verify routing and firewall configurations prevent public systems from reaching internal FCI networks. Simulate access attempts or lateral movement.
Objects (examples of items you could present to the auditor)
- Network Architecture Diagrams: Highlighting VLANs and segmentation practices.
- Firewall Configurations: Showing restricted access between public and internal systems.
- System Inventory: Listing internal and public-facing components and their locations.
- Routing Tables: Evidence of explicitly controlled and isolated paths.
- Monitoring Reports: Logs showing alerting or event correlation related to boundary enforcement.
- Access Approval Records: For any exceptions or shared access between zones.