Failing to identify and prohibit unauthorized traffic leaves the enclave vulnerable to attack. The initial defense for the internal network is for protection measures to block any traffic at the perimeter that is attempting to make a connection (or otherwise establish a traffic flow) to a host in the internal network. However, threats can be introduced into the enclave through non-network means, such as compromised computer media, and compromised hosts then attempt to use the internal network to attack both other internal hosts and external networks. Therefore, all expected traffic must be identified by application, endpoints, protocol, and port and rulesets/ACLs used to only allow the authorized traffic.
This requirement applies to network traffic originating either from inside or outside the enclave. The firewall or other device implementing an Access Control List must only allow traffic through that is explicitly permitted. Only those connections (or traffic flows) which are essential and approved must be allowed. All other inbound and outbound traffic must be denied by default. |