SC.L1-3.13.5 Public-Access System Separation

Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.

Source: FAR Clause 52.204-21 b.1.xi, NIST SP 800-171 Rev 2 3.13.5

Discussion: Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones (DMZs). DMZs are typically implemented with boundary control devices and techniques that include routers, gateways, firewalls, virtualization, or cloud-based technologies. [SP 800-41] provides guidance on firewalls and firewall policy. [SP 800-125B] provides guidance on security for virtualization technologies

SPRS Score: 5