12.1: Maintain an Inventory of Network Boundaries

Maintain an up-to-date inventory of all of the organization’s network boundaries.

Asset Type

Security Function

Implementation Groups

Network

Identify

1, 2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

Inputs

  1. An inventory of expected boundary devices (M1) as derived from the endpoint inventory (see sub-control 1.4)

Operations

  1. Utilize a discovery tool or process to examine the network topology to collect the list of devices considered boundary devices (M2).

  2. Evaluate the complement of Input 1 and Operation 1 to get the list of non-inventoried boundary devices (M3).

Measures

  • M1 = List of expected network boundary devices

  • M2 = Count of M1

  • M3 = List of discovered network boundary devices

  • M4 = Count of M3

  • M5 = List of non-inventoried boundary devices

  • M6 = Count of M5

Metrics

Coverage

Metric

What is the ratio of non-inventoried boundary devices to expected boundary devices?
If the calculated value is greater than zero, the inventory is not current.

Calculation

M6 / M2