Deny network communications traffic by default and allow network communications traffic by exception
📖 What This Means
This practice means that your network should block all traffic by default and only allow specific traffic that you explicitly permit. Think of it like locking all the doors in your house and only unlocking the ones you need to use. For example, if you have a web server, you would only allow traffic to port 80 or 443 (for HTTP and HTTPS) and block everything else. This reduces the risk of unauthorized access or attacks. Another example is allowing only your IT team to access the management interface of your firewall while blocking everyone else. The goal is to minimize exposure and reduce the attack surface.
🎯 Why It Matters
Allowing all network traffic by default poses a significant security risk, as attackers can exploit open ports or services to gain unauthorized access. For instance, in the 2017 Equifax breach, attackers exploited an unpatched vulnerability in a web application that was publicly accessible. By denying traffic by default, you reduce the likelihood of such incidents. The DoD and CMMC emphasize this control because it is a foundational security measure to protect sensitive data and systems. Failure to implement this can lead to data breaches, financial losses, and reputational damage.
✅ How to Implement
- 1. Use cloud-native firewall services like AWS Security Groups, Azure Network Security Groups, or GCP Firewall Rules.
- 2. Configure these firewalls to deny all inbound and outbound traffic by default.
- 3. Create explicit rules to allow only necessary traffic, such as HTTPS (port 443) for web servers or SSH (port 22) for management.
- 4. Regularly review and update firewall rules to ensure they align with current business needs.
- 5. Enable logging and monitoring for firewall rules to detect anomalies.
- 6. Use tools like AWS Config or Azure Policy to enforce compliance with firewall rules.
- 7. Document all rules and exceptions in a centralized policy document.
📋 Evidence Examples
Firewall Configuration Document
Firewall Rule Screenshots
Firewall Logs
Policy Document
Audit Report
📝 SSP Guidance
Use this guidance when writing the System Security Plan (SSP) narrative for this control.
How to Write the SSP Narrative
For SC.L1-3.13.3 ("Deny network communications traffic by default and allow network communications traffic by exception"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your network security architecture, including segmentation, encryption standards, VPN configuration, session management, key management, and monitoring capabilities. Be specific -- name your actual products, settings, and responsible personnel.
Example SSP Narratives
"SC.L1-3.13.3 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to deny network communications traffic by default and allow network communications .... The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."
"SC.L1-3.13.3 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to deny network communications traffic by default and allow network communications .... Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."
"SC.L1-3.13.3 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."
System Boundary Considerations
- • Document network architecture with CUI boundary clearly marked
- • Identify all encryption mechanisms (at rest and in transit)
- • Specify network monitoring and IDS/IPS deployment
- • Ensure this control covers all systems within your defined CUI boundary where deny network communications traffic by default and allow network communications traffic by exception applies
- • Document any systems where this control is not applicable and explain why
Key Documentation to Reference in SSP
- 📄 System and Communications Protection Policy
- 📄 Network architecture diagram
- 📄 Firewall rule documentation
- 📄 Encryption configuration documentation
- 📄 Evidence artifacts specific to SC.L1-3.13.3
- 📄 POA&M entry if control is not fully implemented
What the Assessor Looks For
The assessor will review network diagrams for proper segmentation, test encryption settings, verify VPN split tunneling is disabled, and check FIPS 140-2 validation of cryptographic modules.
💬 Self-Assessment Questions
Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.
Question 1: Is your firewall configured to deny all traffic by default?
Question 2: Have you created explicit rules to allow only necessary traffic?
Question 3: Are firewall logs enabled and reviewed regularly?
Question 4: Is there a documented policy for firewall rules and exceptions?
Question 5: Are firewall rules audited quarterly?
⚠️ Common Mistakes (What Auditors Flag)
1. Leaving firewall rules overly permissive.
2. Failing to document firewall rules.
3. Not reviewing firewall logs.
4. Forgetting to update firewall rules after changes.
5. Not auditing firewall rules regularly.
📚 Parent Policy
This practice is governed by the System and Communications Protection Policy