STIGhub
STIGs
RMF Controls
Compare
← All Controls
SC-7 (29)
System and Communications Protection
Rev 5
Boundary Protection
CCI Identifiers (2)
CCI-004891
Implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
CCI-004892
Defines the critical system components to implement physically or logically separate subnetworks.
Linked STIG Checks (58)
Across 28 STIGs. Click to expand.
▶
Application Layer Gateway Security Requirements Guide
1 check
▶
Arista MLS EOS 4.X L2S Security Technical Implementation Guide
6 checks
▶
Cisco ACI Router Security Technical Implementation Guide
1 check
▶
Cisco ASA Firewall Security Technical Implementation Guide
2 checks
▶
Cisco IOS Router RTR Security Technical Implementation Guide
1 check
▶
Cisco IOS Switch L2S Security Technical Implementation Guide
6 checks
▶
Cisco IOS Switch RTR Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Router RTR Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Switch L2S Security Technical Implementation Guide
6 checks
▶
Cisco IOS XE Switch RTR Security Technical Implementation Guide
1 check
▶
Cisco IOS XR Router RTR Security Technical Implementation Guide
1 check
▶
Cisco NX OS Switch L2S Security Technical Implementation Guide
6 checks
▶
Dell OS10 Switch Layer 2 Switch Security Technical Implementation Guide
1 check
▶
Firewall Security Requirements Guide
1 check
▶
Intrusion Detection and Prevention Systems Security Requirements Guide
1 check
▶
Ivanti Connect Secure VPN Security Technical Implementation Guide
1 check
▶
Juniper EX Series Switches Layer 2 Switch Security Technical Implementation Guide
3 checks
▶
Juniper EX Series Switches Router Security Technical Implementation Guide
5 checks
▶
Juniper Router RTR Security Technical Implementation Guide
1 check
▶
Juniper SRX Services Gateway ALG Security Technical Implementation Guide
2 checks
▶
Juniper SRX Services Gateway VPN Security Technical Implementation Guide
3 checks
▶
Layer 2 Switch Security Requirements Guide
1 check
▶
Palo Alto Networks ALG Security Technical Implementation Guide
1 check
▶
Router Security Requirements Guide
1 check
▶
RUCKUS ICX Layer 2 Switch Security Technical Implementation Guide
1 check
▶
RUCKUS ICX Router Security Technical Implementation Guide
1 check
▶
SDN Controller Security Requirements Guide
1 check
▶
Virtual Private Network (VPN) Security Requirements Guide
1 check