NET-01: Network Security Controls (NSC)
Mechanisms exist to develop, govern & update procedures to facilitate the implementation of Network Security Controls (NSC).
Control Question: Does the organization develop, govern & update procedures to facilitate the implementation of Network Security Controls (NSC)?
General (49)
US (37)
EMEA (17)
| Framework | Mapping Values |
|---|---|
| EMEA EU NIS2 | 21.2(e) 21.5 |
| EMEA EU NIS2 Annex | 1.1.1(a) 6.7.2(b) 6.7.2(i) 6.8.3 6.9.1 |
| EMEA Austria | Sec 14 Sec 15 |
| EMEA Belgium | 16 |
| EMEA Germany C5 2020 | PSS-10 |
| EMEA Israel CDMO 1.0 | 9.1 |
| EMEA Saudi Arabia CSCC-1 2019 | 2-3-1-5 2-4 2-4-1-5 |
| EMEA Saudi Arabia IoT CGIoT-1 2024 | 2-3-1 2-3-2 2-4-1 2-4-5 |
| EMEA Saudi Arabia ECC-1 2018 | 2-4-4 2-5-1 2-5-2 2-5-4 |
| EMEA Saudi Arabia OTCC-1 2022 | 2-3 2-3-1 2-3-1-1 2-4 2-4-1 2-4-2 2-5-2 |
| EMEA Saudi Arabia SACS-002 | TPC-13 TPC-14 TPC-15 TPC-16 TPC-17 TPC-78 |
| EMEA Saudi Arabia SAMA CSF 1.0 | 3.3.4 3.3.8 |
| EMEA South Africa | 19 |
| EMEA Spain BOE-A-2022-7191 | 23 |
| EMEA Spain 311/2022 | 23 |
| EMEA Spain CCN-STIC 825 | 8.4.1 [MP.COM.1] 8.4.2 [MP.COM.2] |
| EMEA UK Cyber Essentials | 1 |
APAC (8)
| Framework | Mapping Values |
|---|---|
| APAC Australia ISM June 2024 | ISM-0521 ISM-0629 ISM-1186 ISM-1428 ISM-1429 ISM-1430 ISM-1711 ISM-1712 ISM-1774 ISM-1783 |
| APAC India SEBI CSCRF | PR.AA.S2 |
| APAC Japan ISMAP | 13.1.1 13.1.2 |
| APAC New Zealand HISF 2022 | HHSP49 HHSP54 HML49 HML54 HSUP41 HSUP46 |
| APAC New Zealand HISF Suppliers 2023 | HSUP41 HSUP46 |
| APAC New Zealand NZISM 3.6 | 10.8.34.C.01 10.8.34.C.02 10.8.35.C.01 10.8.36.C.01 10.8.37.C.01 10.8.38.C.01 18.1.9.C.01 18.1.9.C.02 18.1.9.C.03 18.1.9.C.04 18.1.9.C.05 18.5.7.C.01 18.5.7.C.02 18.5.8.C.01 18.5.8.C.02 18.5.8.C.03 18.5.8.C.04 18.5.9.C.01 18.5.9.C.02 18.5.9.C.03 18.5.10.C.01 18.5.10.C.02 18.5.11.C.01 |
| APAC Singapore Cyber Hygiene Practice | 4.4 |
| APAC Singapore MAS TRM 2021 | 11.2.1 11.2.2 11.2.3 11.2.4 11.2.5 11.2.6 11.2.7 11.2.8 |
Americas (3)
| Framework | Mapping Values |
|---|---|
| Americas Bermuda BMACCC | 6.18 |
| Americas Canada CSAG | 4.10 4.15 |
| Americas Canada ITSP-10-171 | 03.01.12.A 03.01.16.A 03.01.16.B 03.01.18.A 03.13.01.A |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to develop, govern & update procedures to facilitate the implementation of Network Security Controls (NSC).
Level 1 — Performed Informally
Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity and data protection controls.
- Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
- Network monitoring is primarily reactive in nature.
Level 2 — Planned & Tracked
Network Security (NET) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
- IT/cybersecurity personnel identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
- IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization's technology assets, data and network(s).
- Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
- Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
- Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
Level 3 — Well Defined
Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
- Secure engineering principles are used to design and implement network security controls (e.g., industry-recognized secure practices) to enforce the concepts of least privilege and least functionality at the network level.
- IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
- Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
- Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
- Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
Level 4 — Quantitatively Controlled
Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
- Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
- Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
- Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
- Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
- Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving
See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to develop, govern & update procedures to facilitate the implementation of Network Security Controls (NSC).
Assessment Objectives
- NET-01_A01 system and communications protection procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls are developed and documented.
- NET-01_A02 personnel or roles to whom the system and communications protection policy is to be disseminated is/are defined.
- NET-01_A03 personnel or roles to whom the system and communications protection procedures are to be disseminated is/are defined.
- NET-01_A04 an official to manage the system and communications protection policy and procedures is defined.
- NET-01_A05 the frequency at which the current system and communications protection policy is reviewed / updated is defined.
- NET-01_A06 events that would require the current system and communications protection policy to be reviewed / updated are defined.
- NET-01_A07 the frequency at which the current system and communications protection procedures are reviewed / updated is defined.
- NET-01_A08 events that would require the system and communications protection procedures to be reviewed / updated are defined.
- NET-01_A09 a system and communications protection policy is developed and documented.
- NET-01_A10 the system and communications protection policy is disseminated to organization-defined personnel or roles.
- NET-01_A11 the system and communications protection procedures are disseminated to organization-defined personnel or roles.
- NET-01_A12 the organization's system and communications protection policy addresses purpose.
- NET-01_A13 the organization's system and communications protection policy addresses scope.
- NET-01_A14 the organization's system and communications protection policy addresses roles.
- NET-01_A15 the organization's system and communications protection policy addresses responsibilities.
- NET-01_A16 the organization's system and communications protection policy addresses management commitment.
- NET-01_A17 the organization's system and communications protection policy addresses coordination among organizational entities.
- NET-01_A18 the organization's system and communications protection policy addresses compliance.
- NET-01_A19 the organization's system and communications protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines.
- NET-01_A20 the organization-defined official is designated to manage the development, documentation, and dissemination of the system and communications protection policy and procedures.
- NET-01_A21 the current system and communications protection policy is reviewed / updated organization-defined frequency.
- NET-01_A22 the current system and communications protection policy is reviewed / updated following organization-defined events.
- NET-01_A23 the current system and communications protection procedures are reviewed / updated organization-defined frequency.
- NET-01_A24 the current system and communications protection procedures are reviewed / updated following organization-defined events.
- NET-01_A25 network security management operations are conducted according to documented policies, standards, procedures and/or other organizational directives.
- NET-01_A26 adequate resources (e.g., people, processes, technologies, data and/or facilities) are provided to support network security management operations.
- NET-01_A27 responsibility and authority for the performance of network security management-related activities are assigned to designated personnel.
- NET-01_A28 personnel performing network security management-related activities have the skills and knowledge needed to perform their assigned duties.
Evidence Requirements
- E-NET-04 Network Security Controls (NSC)
-
Documented evidence of the organization's network security controls (e.g., boundary protections, content filtering, wireless infrastructure, etc.).
Network Security