(a) Prevent the exfiltration of information; and (b) Conduct exfiltration tests [Assignment: organization-defined frequency].
(a) Prevent the exfiltration of information; and (b) Conduct exfiltration tests [Assignment: organization-defined frequency].
Only allow incoming communications from [Assignment: organization-defined authorized sources] to be routed to [Assignment: organization-defined authorized destinations].
Implement [Assignment: organization-defined host-based boundary protection mechanisms] at [Assignment: organization-defined system components].
Isolate [Assignment: organization-defined information security tools, mechanisms, and support components] from other internal system components by implementing physically separate subnetworks with managed interfaces to other components of the system.
Protect against unauthorized physical connections at [Assignment: organization-defined managed interfaces].
Route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing.
Prevent the discovery of specific system components that represent a managed interface.
Enforce adherence to protocol formats.
Prevent systems from entering unsecure states in the event of an operational failure of a boundary protection device.
Block inbound and outbound communications traffic between [Assignment: organization-defined communication clients] that are independently configured by end users and external service providers.