PR.IR-01.261

Has your organization implemented network segmentation to isolate internal networks from external networks, with controls that restrict inbound traffic to only necessary communications?

Explanation

Network segmentation creates boundaries between different parts of your network, limiting the ability of attackers to move laterally if they gain access. By restricting inbound traffic from external networks to only what is necessary for business operations, you reduce the attack surface and potential entry points for threats. This includes implementing technologies like firewalls, access control lists, and DMZs to create security zones. Evidence of compliance could include network architecture diagrams showing segmentation, firewall rule documentation that demonstrates restricted external access, or results from a network segmentation test that validates the effectiveness of the controls.

Implementation Example

Logically segment organization networks from external networks, and permit only necessary communications to enter the organization's networks from the external networks

ID: PR.IR-01.261

Context

Function
PR: PROTECT
Category
PR.IR: Technology Infrastructure Resilience
Sub-Category
Networks and environments are protected from unauthorized logical access and usage

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron