800-53|SC-7a.

Title

BOUNDARY PROTECTION

Description

Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system;

Reference Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

Family: SYSTEM AND COMMUNICATIONS PROTECTION

Baseline Impact: LOW,MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
2.8 Enable user namespace support --userns-remap=defaultUnixCIS Docker Community Edition v1.1.0 L2 Docker
3.1.1 Set 'no ip source-route'CiscoCIS Cisco IOS 12 L1 v4.0.0
5.30 Do not share the host's user namespacesUnixCIS Docker 1.12.0 v1.0.0 L1 Docker
5.30 Do not share the host's user namespacesUnixCIS Docker 1.13.0 v1.0.0 L1 Docker
5.30 Ensure the host's user namespaces is not sharedUnixCIS Docker Community Edition v1.1.0 L1 Docker
AMLS-L3-000290 - The Arista Multilayer Switch must configure the maximum hop limit value to at least 32.AristaDISA STIG Arista MLS DCS-7000 Series RTR v1r4
ARST-RT-000340 - The Arista router must be configured to restrict traffic destined to itself.AristaDISA STIG Arista MLS EOS 4.2x Router v2r1
ARST-RT-000350 - The Arista router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.AristaDISA STIG Arista MLS EOS 4.2x Router v2r1
ARST-RT-000370 - The Arista perimeter router must be configured to filter ingress traffic at the external interface on an inbound direction.AristaDISA STIG Arista MLS EOS 4.2x Router v2r1
ARST-RT-000380 - The Arista perimeter router must be configured to filter egress traffic at the internal interface on an inbound direction.AristaDISA STIG Arista MLS EOS 4.2x Router v2r1
ARST-RT-000390 - The Arista BGP router must be configured to reject outbound route advertisements for any prefixes belonging to the IP core.AristaDISA STIG Arista MLS EOS 4.2x Router v2r1
ARST-RT-000400 - The Arista router must be configured to block any traffic that is destined to IP core infrastructure.AristaDISA STIG Arista MLS EOS 4.2x Router v2r1
ARST-RT-000410 - The Arista router must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces.AristaDISA STIG Arista MLS EOS 4.2x Router v2r1
ARST-RT-000420 - The out-of-band management (OOBM) Arista gateway router must be configured to forward only authorized management traffic to the Network Operations Center (NOC).AristaDISA STIG Arista MLS EOS 4.2x Router v2r1
ARST-RT-000430 - The out-of-band management (OOBM) Arista gateway router must be configured to block any traffic destined to itself that is not sourced from the OOBM network or the NOC.AristaDISA STIG Arista MLS EOS 4.2x Router v2r1
ARST-RT-000440 - The Arista router must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.AristaDISA STIG Arista MLS EOS 4.2x Router v2r1
ARST-RT-000650 - The Arista perimeter router must be configured to block all outbound management traffic.AristaDISA STIG Arista MLS EOS 4.2x Router v2r1
CISC-RT-000120 - The Cisco router must be configured to protect against or limit the effects of denial of service (DoS) attacks by employing control plane protection.CiscoDISA STIG Cisco IOS XE Router RTR v3r2
CISC-RT-000120 - The Cisco router must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by employing control plane protection.CiscoDISA STIG Cisco IOS Router RTR v3r2
CISC-RT-000120 - The Cisco switch must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by employing control plane protection.CiscoDISA STIG Cisco IOS XE Switch RTR v3r1
CISC-RT-000120 - The Cisco switch must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by employing control plane protection.CiscoDISA STIG Cisco IOS Switch RTR v3r1
CISC-RT-000130 - The Cisco router must be configured to restrict traffic destined to itself.CiscoDISA STIG Cisco IOS-XR Router RTR v3r2
CISC-RT-000130 - The Cisco switch must be configured to restrict traffic destined to itself.CiscoDISA STIG Cisco NX-OS Switch RTR v3r2
CISC-RT-000140 - The Cisco router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself - ICMP packets destined to itselfCiscoDISA STIG Cisco IOS-XR Router RTR v3r2
CISC-RT-000140 - The Cisco switch must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.CiscoDISA STIG Cisco NX-OS Switch RTR v3r2
CISC-RT-000320 - The Cisco perimeter router must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.CiscoDISA STIG Cisco IOS XE Router RTR v3r2
CISC-RT-000320 - The Cisco perimeter router must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.CiscoDISA STIG Cisco IOS Router RTR v3r2
CISC-RT-000320 - The Cisco perimeter router must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.CiscoDISA STIG Cisco IOS-XR Router RTR v3r2
CISC-RT-000320 - The Cisco perimeter switch must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.CiscoDISA STIG Cisco NX-OS Switch RTR v3r2
CISC-RT-000320 - The Cisco perimeter switch must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.CiscoDISA STIG Cisco IOS Switch RTR v3r1
CISC-RT-000320 - The Cisco perimeter switch must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.CiscoDISA STIG Cisco IOS XE Switch RTR v3r1
CISC-RT-000330 - The Cisco perimeter router must be configured to filter ingress traffic at the external interface on an inbound direction.CiscoDISA STIG Cisco IOS XE Router RTR v3r2
CISC-RT-000330 - The Cisco perimeter router must be configured to filter ingress traffic at the external interface on an inbound direction.CiscoDISA STIG Cisco IOS Router RTR v3r2
CISC-RT-000330 - The Cisco perimeter router must be configured to filter ingress traffic at the external interface on an inbound direction.CiscoDISA STIG Cisco IOS-XR Router RTR v3r2
CISC-RT-000330 - The Cisco perimeter switch must be configured to filter ingress traffic at the external interface on an inbound direction.CiscoDISA STIG Cisco IOS Switch RTR v3r1
CISC-RT-000330 - The Cisco perimeter switch must be configured to filter ingress traffic at the external interface on an inbound direction.CiscoDISA STIG Cisco NX-OS Switch RTR v3r2
CISC-RT-000330 - The Cisco perimeter switch must be configured to filter ingress traffic at the external interface on an inbound direction.CiscoDISA STIG Cisco IOS XE Switch RTR v3r1
CISC-RT-000340 - The Cisco perimeter router must be configured to filter egress traffic at the internal interface on an inbound direction.CiscoDISA STIG Cisco IOS Router RTR v3r2
CISC-RT-000340 - The Cisco perimeter router must be configured to filter egress traffic at the internal interface on an inbound direction.CiscoDISA STIG Cisco IOS-XR Router RTR v3r2
CISC-RT-000340 - The Cisco perimeter router must be configured to filter egress traffic at the internal interface on an inbound direction.CiscoDISA STIG Cisco IOS XE Router RTR v3r2
CISC-RT-000340 - The Cisco perimeter switch must be configured to filter egress traffic at the internal interface on an inbound direction.CiscoDISA STIG Cisco IOS Switch RTR v3r1
CISC-RT-000340 - The Cisco perimeter switch must be configured to filter egress traffic at the internal interface on an inbound direction.CiscoDISA STIG Cisco NX-OS Switch RTR v3r2
CISC-RT-000340 - The Cisco perimeter switch must be configured to filter egress traffic at the internal interface on an inbound direction.CiscoDISA STIG Cisco IOS XE Switch RTR v3r1
CISC-RT-000390 - The Cisco perimeter router must be configured to block all outbound management traffic.CiscoDISA STIG Cisco IOS XE Router RTR v3r2
CISC-RT-000390 - The Cisco perimeter router must be configured to block all outbound management traffic.CiscoDISA STIG Cisco IOS Router RTR v3r2
CISC-RT-000390 - The Cisco perimeter router must be configured to block all outbound management traffic.CiscoDISA STIG Cisco IOS-XR Router RTR v3r2
CISC-RT-000390 - The Cisco perimeter switch must be configured to block all outbound management traffic.CiscoDISA STIG Cisco IOS Switch RTR v3r1
CISC-RT-000390 - The Cisco perimeter switch must be configured to block all outbound management traffic.CiscoDISA STIG Cisco NX-OS Switch RTR v3r2
CISC-RT-000390 - The Cisco perimeter switch must be configured to block all outbound management traffic.CiscoDISA STIG Cisco IOS XE Switch RTR v3r1
CISC-RT-000400 - The Cisco out-of-band management (OOBM) gateway router must be configured to transport management traffic to the Network Operations Center (NOC) via dedicated circuit, MPLS/VPN service, or IPsec tunnel.CiscoDISA STIG Cisco IOS Router RTR v3r2