Skip to main content

WEB-02: Use of Demilitarized Zones (DMZ)

WEB 9 — Critical Protect

Mechanisms exist to utilize a Demilitarized Zone (DMZ) to restrict inbound traffic to authorized Technology Assets, Applications and/or Services (TAAS) on certain services, protocols and ports.

Control Question: Does the organization utilize a Demilitarized Zone (DMZ) to restrict inbound traffic to authorized Technology Assets, Applications and/or Services (TAAS) on certain services, protocols and ports?

General (7)
Framework Mapping Values
ISO 27002 2022 8.22
MPA Content Security Program 5.1 TS-1.9 TS-1.15 TS-2.0
NIST 800-171 R2 (source) 3.1.22
NIST 800-171A (source) 3.1.22[a] 3.1.22[b] 3.1.22[c] 3.1.22[d] 3.1.22[e]
Shared Assessments SIG 2025 N.8
SWIFT CSF 2023 1.1
SCF CORE Mergers, Acquisitions & Divestitures (MA&D) WEB-02
US (6)
Framework Mapping Values
US CMMC 2.0 Level 1 (source) AC.L1-B.1.IV
US CMMC 2.0 Level 2 (source) AC.L2-3.1.22
US CMMC 2.0 Level 3 (source) AC.L2-3.1.22
US FAR 52.204-21 52.204-21(b)(1)(iv)
US HIPAA HICP Medium Practice 6.M.A 6.M.B
US HIPAA HICP Large Practice 6.M.A 6.M.B
EMEA (4)
Framework Mapping Values
EMEA Austria Sec 14 Sec 15
EMEA Belgium 16
EMEA Saudi Arabia OTCC-1 2022 2-4-1-10 2-4-1-13
EMEA Saudi Arabia SACS-002 TPC-41

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to utilize a Demilitarized Zone (DMZ) to restrict inbound traffic to authorized Technology Assets, Applications and/or Services (TAAS) on certain services, protocols and ports.

Level 1 — Performed Informally

C|P-CMM1 is N/A, since a structured process is required to utilize a Demilitarized Zone (DMZ) to restrict inbound traffic to authorized Technology Assets, Applications and/or Services (TAAS) on certain services, protocols and ports.

Level 2 — Planned & Tracked

Web Security (WEB) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Internet-facing technologies management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
  • IT/cybersecurity personnel identify cybersecurity and data protection controls to address applicable statutory, regulatory and contractual requirements for Internet-facing technologies management.
  • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed (e.g., Demilitarized Zones (DMZs)).
  • Internet-facing technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Level 3 — Well Defined

Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized Technology Assets, Applications and/or Services (TAAS) on certain services, protocols and ports.

  • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
  • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unauthorized.
  • Ongoing content reviews are performed to ensure web pages do not contain non-public information.
  • Security engineering, or a similar function, ensures that Internet-facing Technology Assets, Applications and/or Services (TAAS) conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs).
  • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies.
  • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity.
  • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management.
  • An IT Asset Management (ITAM) function, or similar function, categorizes network Technology Assets, Applications and/or Services (TAAS) according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
  • Boundary protections:
Level 4 — Quantitatively Controlled

Web Security (WEB) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
  • Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
  • Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
  • Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
  • Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
  • Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving

See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to utilize a Demilitarized Zone (DMZ) to restrict inbound traffic to authorized Technology Assets, Applications and/or Services (TAAS) on certain services, protocols and ports.

Assessment Objectives

  1. WEB-02_A01 a Demilitarized Zone (DMZ) architecture is utilized for Internet-facing technologies to restrict inbound traffic to authorized devices on certain services, protocols and ports.

Technology Recommendations

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.