Networks and environments are protected from unauthorized logical access
Network segmentation and access controls are the barriers that prevent a compromised endpoint from becoming a full breach. When everything is on a flat network with implicit trust, an attacker who compromises one system can move laterally to any other. Defense in depth at the network layer means that containing an attacker requires compromising additional barriers, giving defenders time to detect and respond.
Implementation steps
- 1
Segment your network by trust level and function
Divide your network into security zones: corporate endpoint network, production environment, developer environments, guest/IoT network, and management network. Apply controls at zone boundaries: only permitted traffic flows should be able to cross. At minimum, production systems should not be reachable directly from the corporate endpoint network.
aws-vpccloudflare-accessciscopalo-alto - 2
Implement network access control with least-privilege rules
Define firewall or security group rules on an allow-list basis: deny all, then explicitly permit only what is needed. Review firewall rules at least annually to remove stale entries. Use a zero-trust network access (ZTNA) tool for remote access rather than a traditional VPN that provides broad network access once connected.
aws-security-groupscloudflare-accesstailscalezscalerpalo-alto-prisma - 3
Monitor for unauthorized network access attempts
Enable logging on network boundaries and configure alerts for: connection attempts to management ports from unexpected sources, successful connections on unexpected ports, and traffic between segments that should not be communicating. These alerts are the early warning signals for lateral movement.
aws-guarddutydatadogsplunkpalo-alto
Evidence required
Network architecture diagram
A current diagram showing network segments, trust zones, and the controls enforced at zone boundaries.
- · VPC architecture diagram showing security groups and subnets
- · Network diagram with firewall rules between segments annotated
- · Zero-trust access policy documentation showing network segmentation
Firewall or security group rule review
Evidence of a recent review of network access control rules to confirm they follow least-privilege principles.
- · Annual firewall rule review sign-off document
- · AWS Security Group or Azure NSG configuration showing deny-by-default
- · Network access control policy with rule review cadence defined
Related controls
Technology assets are protected from environmental threats
Technology Infrastructure Resilience
Mechanisms are implemented to achieve resilience requirements in normal and adverse situations
Technology Infrastructure Resilience
Adequate resource capacity to ensure availability is maintained
Technology Infrastructure Resilience
Identities and credentials are managed for authorized users and devices
Identity Management, Authentication, and Access Control