NIST SP 800-171 & CMMC 2.0 Control 3.13.5 Requirement:
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
NIST SP 800-171 & CMMC 2.0 3.13.5 Requirement Explanation:
Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones (DMZs). DMZs are typically implemented with boundary control devices and techniques that include routers, gateways, firewalls, virtualization, or cloud-based technologies.
Example NIST SP 800-171 & CMMC 2.0 3.13.5 Implementation:
Do not place servers that need to be publicly accessible on your internal network. Instead, set up a "demilitarized zone" (DMZ) and place those servers in it.
NIST SP 800-171 & CMMC 2.0 3.13.5 Scenario(s):
- Scenario 1:
Alice built a server that will host her company's website. Instead of placing the web-server on her internal network she creates a DMZ and places the webserver in it. The web server is now accessible from the internet and is separate from her company network. If a hacker compromises the webserver he gets trapped in the DMZ and can't access the internal network.
- Scenario 2:
Alice needs to find a solution to host her company's new website. Instead of setting up her own web server and DMZ, she decides to use a web hosting company. As a result, she avoids having to set up a DMZ.
Discover Our NIST SP 800-171 & CMMC 2.0 Solutions:
Power through compliance. Meet and maintain your NIST SP 800-171 & CMMC 2.0 compliance requirements.
Transform your business. Create new revenue streams and provide scalability for your NIST SP 800-171 and CMMC 2.0 services.
Supply Chain Verifier
Trust is everything. Verify, monitor, and support subcontactor compliance.