Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SC

SC-7Boundary Protection

Monitor and control communications at the external managed interfaces to the system and at key internal managed interfaces within the system; Implement subnetworks for publicly accessible system components that are {{ insert: param, sc-07_odp }} separated from internal organizational networks; and Connect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security and privacy architecture.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (4)

ATT&CK techniques this control mitigates (156)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-862Missing Authorization8,680Missing authorization for internal functions is mitigated by requiring all external access to traverse managed boundaries.
CWE-284Improper Access Control4,832Boundary devices and interface controls directly enforce network-level access restrictions between spheres.
CWE-863Incorrect Authorization3,234Incorrect authorization decisions are enforced or detected at external and key internal managed interfaces.
CWE-918Server-Side Request Forgery (SSRF)2,872Outbound connections to external resources can be monitored and limited at the boundary, reducing SSRF impact.
CWE-306Missing Authentication for Critical Function2,567Public components are isolated in separate subnetworks and critical internal functions are reachable only via controlled interfaces.
CWE-285Improper Authorization1,230Communications are authorized only through managed boundary devices and segmented subnetworks.
CWE-668Exposure of Resource to Wrong Sphere779Internal resources are kept in separate network spheres from externally accessible components.
CWE-923Improper Restriction of Communication Channel to Intended Endpoints57The control explicitly requires that all external connections use managed boundary devices that restrict channels to intended endpoints.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-0108 KEV9.59.10.9412good
CVE-2025-342212.29.80.0365good
CVE-2025-72062.19.80.0295good
CVE-2025-350512.09.80.0024good
CVE-2025-543042.09.80.0008good
CVE-2026-237672.09.80.0007good
CVE-2025-641232.09.80.0008good
CVE-2025-342182.09.80.0073good
CVE-2026-342051.99.60.0005good
CVE-2021-44771.89.10.0000good
CVE-2026-44751.88.80.0003good
CVE-2025-342021.88.80.0050good
CVE-2026-274661.57.20.0018good
CVE-2024-509541.57.50.0031good
CVE-2025-2747 KEV9.49.80.9126good
CVE-2025-61882 KEV9.39.80.8938partial
CVE-2025-53770 KEV9.39.80.8854good
CVE-2025-19747.49.80.9113good
CVE-2025-299277.39.10.9206good
CVE-2026-35616 KEV6.69.80.4321good
CVE-2024-54085 KEV6.59.80.4297good
CVE-2024-484575.27.50.6162partial
CVE-2025-125484.49.00.4368good
CVE-2025-61932 KEV4.19.80.0196good
CVE-2025-0111 KEV3.56.50.0369good

Other controls in family SC

SC-1 SC-10 SC-11 SC-12 SC-13 SC-14 SC-15 SC-16 SC-17 SC-18 SC-19 SC-2 SC-20 SC-21 SC-22 SC-23 SC-24 SC-25 SC-26 SC-27 SC-28 SC-29 SC-3 SC-30 SC-31 SC-32 SC-33 SC-34 SC-35 SC-36 SC-37 SC-38 SC-39 SC-4 SC-40 SC-41 SC-42 SC-43 SC-44 SC-45 SC-46 SC-47 SC-48 SC-49 SC-5 SC-50 SC-51 SC-6 SC-8 SC-9