CMMC 1.0 Practice SC.1.175 Requirement:
Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.
CMMC 1.0 SC.1.175 Requirement Explanation:
The goal of this control is to protect your systems from network-based attacks using firewalls. To do this firewalls separate your company's networks from attackers. Firewalls also control the traffic allowed across your network. These two features prevent and limit the effectiveness of network-based attacks.
Example CMMC 1.0 SC.1.175 Implementation:
Deploy a firewall between your company network and the internet. Your internet router generally has a built-in firewall. Configure your firewall to only allow authorized traffic in and out of your network. Achieve this by blocking unnecessary/unused websites, services and ports. Unnecessary websites include adult, gambling, and malicious websites. If you have several internal networks, deploy a firewall between them. Only allow necessary traffic between your networks.
CMMC 1.0 SC.1.175 Scenario(s):
- Scenario 1:
Alice is a system administrator at a small company. She configures the firewall on her router to only allow HTTP and HTTPS traffic to exit her network. She also configures it to block gambling, pornographic, and malicious sites. Alice is now monitoring, controlling, and protecting her company's network communications.
Discover Our NIST SP 800-171 & CMMC 2.0 Solutions:
Power through compliance. Meet and maintain your NIST SP 800-171 & CMMC 2.0 compliance requirements.
Transform your business. Create new revenue streams and provide scalability for your NIST SP 800-171 and CMMC 2.0 services.
Supply Chain Verifier
Trust is everything. Verify, monitor, and support subcontactor compliance.