The second Practice within the System and Communication Protection Domain is, SC.1. 176: implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. This Practice also falls within the Capability, C039 – Control Communications at System Boundaries. This Practice, along with the following content, is found in the CMMC V1.02, Appendix B, B-207 (Pg. 247 in the PDF).
Discussion from Source: NIST SP 800-171, R2
Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones (DMZ ). DMZ’s are typically implemented with boundary control devices and techniques that include routers, gateways, firewalls, virtualization, or cloud-based technologies.
NIST SP-800-41 provides guidance on firewalls and firewall policy. NIST SP-800-125B provides guidance on security for virtualization technologies.
Separate the publicly accessible systems from the internal systems that need to be protected. Do not place the internal systems on the same network as the publicly accessible systems.
A network or part of a network that is separated (sometimes physically) from an internal network is called a demilitarized zone ( DMZ ). A DMZ is a host or part of a network put in a “neutral zone” between an organization’s internal network (the protected side) and a larger network, like the internet. To separate a subnetwork physically, your company may put in boundary control devices (i.e., routers, gateways, firewalls). This can also be done on a cloud network that can be separated from the rest of the network.
A DMZ can add an extra layer of security to your company’s local area network (LAN), because an external network node can reach only what is permitted to be accessed in the DMZ.
Physical separation might involve a separate network infrastructure, dedicated network equipment with separate LAN segments and a firewall between the internal network and the DMZ segment and a firewall between the DMZ segment in the internet. A logical separation might involve VLAN separation for the DMZ supporting a separate subnet with routing and access controls between subnets.
The head of recruiting wants to launch a website to post job openings and allow the public to download an application form. After some discussion, your team realizes it needs to use a router and firewall to create a DMZ to do this. You host the server separately from the company’s internal network and make sure the network has the correct security firewall rules. Your company gets a lot of great candidates for the open jobs, and the company’s internal network is protected.
In our next entry, we will move to the final Domain included in CMMC, Level 1, System Information and Integrity, which has 2 Capabilities and 4 Practices.
By Mark Lupo, MBCP, SMP