4 KiB
implementation-status | control-origination | |||||
---|---|---|---|---|---|---|
|
|
sc-7.4 - [catalog] External Telecommunications Services
Control Statement
-
[a] Implement a managed interface for each external telecommunication service;
-
[b] Establish a traffic flow policy for each managed interface;
-
[c] Protect the confidentiality and integrity of the information being transmitted across each interface;
-
[d] Document each exception to the traffic flow policy with a supporting mission or business need and duration of that need;
-
[e] Review exceptions to the traffic flow policy frequency and remove exceptions that are no longer supported by an explicit mission or business need;
-
[f] Prevent unauthorized exchange of control plane traffic with external networks;
-
[g] Publish information to enable remote networks to detect unauthorized control plane traffic from internal networks; and
-
[h] Filter unauthorized control plane traffic from external networks.
Control guidance
External telecommunications services can provide data and/or voice communications services. Examples of control plane traffic include Border Gateway Protocol (BGP) routing, Domain Name System (DNS), and management protocols. See SP 800-189 for additional information on the use of the resource public key infrastructure (RPKI) to protect BGP routes and detect unauthorized BGP announcements.
Control assessment-objective
a managed interface is implemented for each external telecommunication service; a traffic flow policy is established for each managed interface; the confidentiality of the information being transmitted across each interface is protected; the integrity of the information being transmitted across each interface is protected; each exception to the traffic flow policy is documented with a supporting mission or business need and duration of that need; exceptions to the traffic flow policy are reviewed frequency; exceptions to the traffic flow policy that are no longer supported by an explicit mission or business need are removed; unauthorized exchanges of control plan traffic with external networks are prevented; information is published to enable remote networks to detect unauthorized control plane traffic from internal networks; unauthorized control plane traffic is filtered from external networks.
What is the solution and how is it implemented?
Implementation (a)
Add control implementation description here for item sc-7.4_smt.a
Implementation (b)
Add control implementation description here for item sc-7.4_smt.b
Implementation (c)
Add control implementation description here for item sc-7.4_smt.c
Implementation (d)
Add control implementation description here for item sc-7.4_smt.d
Implementation (e)
Add control implementation description here for item sc-7.4_smt.e
Implementation (f)
Add control implementation description here for item sc-7.4_smt.f
Implementation (g)
Add control implementation description here for item sc-7.4_smt.g
Implementation (h)
Add control implementation description here for item sc-7.4_smt.h