STIGhub
STIGs
RMF Controls
Compare
← All Controls
SC-7
System and Communications Protection
Rev 5
Boundary Protection
CCI Identifiers (6)
CCI-001097
Monitor and control communications at the external managed interfaces to the system and at key managed interfaces within the system.
CCI-001098
Connect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.
CCI-001657
The organization defines the external boundary of the information system.
CCI-001658
The organization defines key internal boundaries of the information system.
CCI-002395
Implement subnetworks for publicly accessible system components that are physically and/or logically separated from internal organizational networks.
CCI-004868
Connect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational privacy architecture.
Linked STIG Checks (185)
Across 35 STIGs. Click to expand.
▶
Arista MLS DCS-7000 Series RTR Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.2x Router Security Technical Implementation Guide
11 checks
▶
Arista MLS EOS 4.X Router Security Technical Implementation Guide
11 checks
▶
Cisco ACI Router Security Technical Implementation Guide
2 checks
▶
Cisco ASA Firewall Security Technical Implementation Guide
1 check
▶
Cisco IOS Router RTR Security Technical Implementation Guide
13 checks
▶
Cisco IOS Switch RTR Security Technical Implementation Guide
8 checks
▶
Cisco IOS XE Router RTR Security Technical Implementation Guide
13 checks
▶
Cisco IOS XE Switch RTR Security Technical Implementation Guide
9 checks
▶
Cisco IOS XR Router RTR Security Technical Implementation Guide
14 checks
▶
Cisco NX OS Switch RTR Security Technical Implementation Guide
10 checks
▶
Cloud Computing Mission Owner Network Security Requirements Guide
4 checks
▶
Dell OS10 Switch Router Security Technical Implementation Guide
5 checks
▶
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
1 check
▶
F5 BIG-IP TMOS Firewall Security Technical Implementation Guide
1 check
▶
Firewall Security Requirements Guide
1 check
▶
Fortinet FortiGate Firewall Security Technical Implementation Guide
1 check
▶
HP FlexFabric Switch RTR Security Technical Implementation Guide
1 check
▶
HPE Aruba Networking AOS VPN Security Technical Implementation Guide
1 check
▶
HPE Aruba Networking AOS Wireless Security Technical Implementation Guide
1 check
▶
Juniper EX Series Switches Router Security Technical Implementation Guide
13 checks
▶
Juniper Router RTR Security Technical Implementation Guide
14 checks
▶
Network Infrastructure Policy Security Technical Implementation Guide
7 checks
▶
Network WLAN AP-IG Platform Security Technical Implementation Guide
1 check
▶
Network WLAN AP-NIPR Platform Security Technical Implementation Guide
1 check
▶
Network WLAN Bridge Platform Security Technical Implementation Guide
1 check
▶
Network WLAN Controller Platform Security Technical Implementation Guide
1 check
▶
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
2 checks
▶
Router Security Requirements Guide
16 checks
▶
RUCKUS ICX Router Security Technical Implementation Guide
15 checks
▶
Virtual Private Network (VPN) Security Requirements Guide
1 check
▶
VMware NSX 4.x Tier-0 Gateway Firewall Security Technical Implementation Guide
1 check
▶
VMware NSX 4.x Tier-1 Gateway Firewall Security Technical Implementation Guide
1 check
▶
VMware NSX-T Tier-0 Gateway Firewall Security Technical Implementation Guide
1 check
▶
VMware NSX-T Tier-0 Gateway RTR Security Technical Implementation Guide
1 check