12.3: Deny Communications With Known Malicious IP Addresses

Deny communications with known malicious or unused Internet IP addresses and limit access only to trusted and necessary IP address ranges at each of the organization’s network boundaries.

Asset Type

Security Function

Implementation Groups

Network

Protect

2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

  • Sub-control 12.1: Maintain an Inventory of Network Boundaries

Inputs

  1. The list of endpoints

  2. The list of trusted and necessary IP address ranges

  3. The list of known malicious IP addresses

  4. The list of unused Internet IP addresses

Operations

  1. Enumerate all network devices identified as guarding a network boundary

  2. For each network boundary device, examine its configuration to ensure rules as follows, noting appropriately and inappropriately configured devices:
    1. Allow communications only with IP addresses in the list of trusted and necessary IP address ranges

    2. Explicitly deny communications with IP addresses in the list of known malicious IP addresses

    3. Explicitly deny communications with IP addresses in the list of unused IP addresses

Measures

  • M1 = List of all network boundary devices

  • M2 = List of appropriately configured network boundary devices

  • M3 = List of inappropriately configured network boundary devices

  • M4 = Count of network boundary devices (the count of M1)

  • M5 = Count of appropriately configured network boundary devices (the count of M2)

  • M6 = Count of inappropriately configured network boundary devices (the count of M3)

Metrics

Coverage

Metric

The ratio of appropriately configured network boundary devices to the total number of
network boundary devices

Calculation

M5 / M4