STIGhub
STIGs
RMF Controls
Compare
← All Controls
SC-7 (11)
System and Communications Protection
Rev 3
Boundary Protection
CCI Identifiers (4)
CCI-001117
The information system checks incoming communications to ensure the communications are coming from an authorized source and routed to an authorized destination.
CCI-002401
Defines the authorized sources from which the system will allow incoming communications.
CCI-002402
Defines the authorized destinations for routing inbound communications.
CCI-002403
Only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
Linked STIG Checks (200)
Across 38 STIGs. Click to expand.
▶
A10 Networks ADC ALG Security Technical Implementation Guide
1 check
▶
Akamai KSD Service Impact Level 2 ALG Security Technical Implementation Guide
1 check
▶
Application Layer Gateway Security Requirements Guide
1 check
▶
Arista MLS DCS-7000 Series RTR Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.2x Router Security Technical Implementation Guide
9 checks
▶
Arista MLS EOS 4.X Router Security Technical Implementation Guide
9 checks
▶
CA API Gateway ALG Security Technical Implementation Guide
1 check
▶
Cisco ACI Router Security Technical Implementation Guide
2 checks
▶
Cisco ASA Firewall Security Technical Implementation Guide
4 checks
▶
Cisco IOS Router RTR Security Technical Implementation Guide
17 checks
▶
Cisco IOS Switch RTR Security Technical Implementation Guide
16 checks
▶
Cisco IOS XE Router RTR Security Technical Implementation Guide
17 checks
▶
Cisco IOS XE Switch RTR Security Technical Implementation Guide
17 checks
▶
Cisco IOS XR Router RTR Security Technical Implementation Guide
17 checks
▶
Cisco NX OS Switch RTR Security Technical Implementation Guide
11 checks
▶
Dell OS10 Switch Router Security Technical Implementation Guide
3 checks
▶
F5 BIG-IP Advanced Firewall Manager Security Technical Implementation Guide
1 check
▶
F5 BIG-IP Local Traffic Manager Security Technical Implementation Guide
1 check
▶
F5 BIG-IP TMOS Firewall Security Technical Implementation Guide
3 checks
▶
Firewall Security Requirements Guide
4 checks
▶
Fortinet FortiGate Firewall Security Technical Implementation Guide
4 checks
▶
HP FlexFabric Switch RTR Security Technical Implementation Guide
1 check
▶
HPE Aruba Networking AOS Wireless Security Technical Implementation Guide
1 check
▶
IBM DataPower ALG Security Technical Implementation Guide
2 checks
▶
Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation Guide
1 check
▶
Ivanti Sentry 9.x ALG Security Technical Implementation Guide
1 check
▶
Juniper EX Series Switches Router Security Technical Implementation Guide
17 checks
▶
Juniper Router RTR Security Technical Implementation Guide
15 checks
▶
Juniper SRX Services Gateway ALG Security Technical Implementation Guide
1 check
▶
Juniper SRX Services Gateway VPN Security Technical Implementation Guide
1 check
▶
Juniper SRX SG VPN Security Technical Implementation Guide
1 check
▶
Microsoft Windows PAW Security Technical Implementation Guide
1 check
▶
Network WLAN AP-IG Platform Security Technical Implementation Guide
1 check
▶
Network WLAN Bridge Platform Security Technical Implementation Guide
1 check
▶
Network WLAN Controller Platform Security Technical Implementation Guide
1 check
▶
Palo Alto Networks ALG Security Technical Implementation Guide
1 check
▶
Router Security Requirements Guide
3 checks
▶
RUCKUS ICX Router Security Technical Implementation Guide
11 checks