PR.IR-01.261
Has your organization implemented network segmentation to isolate internal networks from external networks, with controls that restrict inbound traffic to only necessary communications?
Explanation
Network segmentation creates boundaries between different parts of your network, limiting the ability of attackers to move laterally if they gain access. By restricting inbound traffic from external networks to only what is necessary for business operations, you reduce the attack surface and potential entry points for threats. This includes implementing technologies like firewalls, access control lists, and DMZs to create security zones. Evidence of compliance could include network architecture diagrams showing segmentation, firewall rule documentation that demonstrates restricted external access, or results from a network segmentation test that validates the effectiveness of the controls.
Implementation Example
Logically segment organization networks from external networks, and permit only necessary communications to enter the organization's networks from the external networks
ID: PR.IR-01.261
Context
- Function
- PR: PROTECT
- Category
- PR.IR: Technology Infrastructure Resilience
- Sub-Category
- Networks and environments are protected from unauthorized logical access and usage

