Skip to main content
NetStable
Level 1 SC.L1-3.13.1

Monitor, control, and protect organizational communications at the external boundaries

📖 What This Means

This practice means your organization must actively watch, manage, and secure all incoming and outgoing network traffic where your systems connect to external networks (like the internet). Think of it like installing security cameras and checkpoints at all the doors of your building. You're looking for suspicious activity, blocking unauthorized access, and ensuring only approved communications enter or leave. For example: 1) A small defense contractor sets up a firewall to block unauthorized access attempts from the internet. 2) A manufacturer monitors email attachments leaving their network to prevent accidental data leaks.

🎯 Why It Matters

Unprotected network boundaries are the #1 entry point for cyberattacks. The 2023 Verizon DBIR found 85% of breaches involved external actors exploiting weak perimeter controls. For defense contractors, this could mean: - Loss of Controlled Unclassified Information (CUI) - Compromised bid proposals costing $250k+ in rework - Failing CMMC audits and losing contracts. The DoD specifically requires this control because adversaries constantly scan contractor networks for vulnerabilities. A real-world example: In 2022, a small aerospace contractor had their FTP server hacked because they weren't monitoring external connections, resulting in stolen blueprints.

How to Implement

  1. 1. Enable AWS Shield Standard or Azure DDoS Protection on all VPCs/vNets
  2. 2. Configure NSGs (Azure) or Security Groups (AWS) to allow only necessary ports (e.g., block all inbound except 443)
  3. 3. Set up VPC Flow Logs (AWS) or NSG Flow Logs (Azure) sent to a SIEM like Azure Sentinel
  4. 4. Deploy a cloud firewall like AWS Network Firewall or Azure Firewall with threat intelligence feeds
  5. 5. Enable logging for all perimeter services (API Gateways, Load Balancers)
⏱️
Estimated Effort
2-3 days for basic implementation (mid-level IT skills), plus ongoing monitoring. Cloud setups may be faster (1-2 days) due to managed services.

📋 Evidence Examples

Firewall Rule Configuration

Format: PDF/Excel
Frequency: Quarterly or after changes
Contents: List of all rules showing source/destination IPs, ports, protocols, and 'deny all' default rule
Collection: Export from firewall admin console

Blocked Traffic Logs

Format: CSV/Log files
Frequency: Monthly
Contents: Sample logs showing blocked connection attempts (sanitize IPs)
Collection: Export from firewall/SIEM

Network Diagram

Format: Visio/PDF
Frequency: Annually
Contents: Diagram showing all external connections with security controls labeled
Collection: Create/update in diagramming tool

Firewall Change Request Form

Format: PDF/Word
Frequency: Per change
Contents: Signed form showing business justification for any new rule
Collection: Save approved forms to compliance folder

📝 SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For SC.L1-3.13.1 ("Monitor, control, and protect organizational communications at the external boundaries"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your network security architecture, including segmentation, encryption standards, VPN configuration, session management, key management, and monitoring capabilities. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"SC.L1-3.13.1 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to monitor, control, and protect organizational communications at the external boun.... The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"SC.L1-3.13.1 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to monitor, control, and protect organizational communications at the external boun.... Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"SC.L1-3.13.1 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • Document network architecture with CUI boundary clearly marked
  • Identify all encryption mechanisms (at rest and in transit)
  • Specify network monitoring and IDS/IPS deployment
  • Ensure this control covers all systems within your defined CUI boundary where monitor, control, and protect organizational communications at the external boundaries applies
  • Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • 📄 System and Communications Protection Policy
  • 📄 Network architecture diagram
  • 📄 Firewall rule documentation
  • 📄 Encryption configuration documentation
  • 📄 Evidence artifacts specific to SC.L1-3.13.1
  • 📄 POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will review network diagrams for proper segmentation, test encryption settings, verify VPN split tunneling is disabled, and check FIPS 140-2 validation of cryptographic modules.

💬 Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do we have a firewall or equivalent protecting all external network connections?

✅ YES → Proceed to Q2
❌ NO → GAP: Install perimeter firewall (pfSense for budget option) within 2 weeks
Remediation:
Firewall implementation project

Question 2: Are default firewall rules set to 'deny all' with specific allow rules for required traffic?

✅ YES → Proceed to Q3
❌ NO → GAP: Reconfigure firewall following least privilege principles within 1 week
Remediation:
Firewall rule audit and cleanup

Question 3: Are logs being kept for all blocked inbound/outbound connection attempts?

✅ YES → Proceed to Q4
❌ NO → GAP: Enable logging with 90-day retention within 3 days
Remediation:
Logging configuration update

Question 4: Is someone reviewing security alerts from perimeter devices at least weekly?

✅ YES → Proceed to Q5
❌ NO → GAP: Assign alert monitoring responsibility and document process within 1 week
Remediation:
Create monitoring SOP

Question 5: Have all unnecessary ports (e.g., Telnet, SMB) been closed at the perimeter?

✅ YES → COMPLIANT
❌ NO → GAP: Perform port scan and close unused ports within 5 business days
Remediation:
Port hardening project

⚠️ Common Mistakes (What Auditors Flag)

1. Firewall allows 'any/any' rules for convenience

Why this happens: Ease of use over security during troubleshooting
How to avoid: Implement change control process requiring business justification for all new rules

2. No logging enabled or logs not retained

Why this happens: Storage concerns or lack of awareness
How to avoid: Configure log rotation to SIEM/cloud storage (AWS S3 logs cost ~$0.023/GB/month)

3. Missing documentation for allowed traffic

Why this happens: Rules added ad-hoc without tracking
How to avoid: Maintain a firewall rule matrix spreadsheet linked to business needs

4. Not monitoring cloud service perimeter (e.g., S3 buckets)

Why this happens: Assuming cloud providers handle all security
How to avoid: Enable AWS GuardDuty or equivalent and check public access blockers

📚 Parent Policy

This practice is governed by the System and Communications Protection Policy

View SC Policy →

📚 Related Controls