Applicable (Y)es / (N)o |
(C)onfidentiality |
(I)ntegrity |
(A)vailability |
RPN (C+I+A) |
(S)atisfactory |
||||||
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
(O)ther than satisfactory +## |
||
|
|
|
|
|
|
|
|
|
|
|
|
###
sc-7(4) |
boundary protection | external telecommunications services |
||
|
assessment objective: Determine if the organization: |
||
sc-7(4)(a) |
implements a managed interface for each external telecommunication service; |
||
sc-7(4)(b) |
establishes a traffic flow policy for each managed interface; |
||
sc-7(4)(c) |
protects the confidentiality and integrity of the information being transmitted across each interface; |
||
sc-7(4)(d) |
documents each exception to the traffic flow policy with: |
||
sc-7(4)(d)[1] |
a supporting mission/business need; |
||
sc-7(4)(d)[2] |
duration of that need; |
||
sc-7(4)(e) |
sc-7(4)(e)[1] |
defines a frequency to review exceptions to traffic flow policy; |
|
sc-7(4)(e)[2] |
reviews exceptions to the traffic flow policy with the organization-defined frequency; and |
||
sc-7(4)(e)[3] |
removes traffic flow policy exceptions that are no longer supported by an explicit mission/business need |
||
potential assessment methods and objects: Examine: [select from: System and communications protection policy; traffic flow policy; information flow control policy; procedures addressing boundary protection; information system security architecture; information system design documentation; boundary protection hardware and software; information system architecture and configuration documentation; information system configuration settings and associated documentation; records of traffic flow policy exceptions; information system audit records; other relevant documents or records]. Interview: [select from: System/network administrators; organizational personnel with information security responsibilities; organizational personnel with boundary protection responsibilities]. Test: [select from: Organizational processes for documenting and reviewing exceptions to the traffic flow policy; organizational processes for removing exceptions to the traffic flow policy; automated mechanisms implementing boundary protection capability; managed interfaces implementing traffic flow policy]. |