13.3: Monitor and Block Unauthorized Network Traffic

Deploy an automated tool on network perimeters that monitors for unauthorized transfer of sensitive information and blocks such transfers while alerting information security professionals.

Asset Type

Security Function

Implementation Groups

Data

Detect

3

Dependencies

  • Sub-control 2.1: Maintain Inventory of Authorized Software

  • Sub-control 12.1: Maintain an Inventory of Network Boundaries

Inputs

  1. The list of authorized software

  2. The list of network perimeters

Operations

  1. Enumerate all network perimeter monitoring systems

  2. For each network perimeter monitoring system:
    1. Enumerate the network perimeters covered by the system

    2. Examine its configuration to ensure that the system is configured to:
      1. Monitor for sensitive information

      2. Block transfer of detected sensitive information

      3. Alert appropriately

  3. Enumerate network perimeters covered by all network perimeter monitoring systems

  4. Complement the set of covered network perimeters with the list of network perimeters to identify all uncovered network perimeters

Assumptions

  • Network perimeter monitoring systems are primarily software-based

Measures

  • M1 = List of network perimeter monitoring systems

  • M2 = List of network perimeters

  • M3 = List of appropriately configured perimeter monitoring systems

  • M4 = List of inappropriately configured perimeter monitoring systems

  • M5 = List of network perimeters covered by at least one network perimeter monitoring system

  • M6 = List of network perimeters not covered by at least one network perimeter monitoring system

  • M7 = Count of network perimeter monitoring systems (count of M1)

  • M8 = Count of network perimeters (count of M2)

  • M9 = Count of appropriately configured perimeter monitoring systems (count of M3)

  • M10 = Count of inappropriately configured perimeter monitoring systems (count of M4)

  • M11 = Count of network perimeters covered by at least one network perimeter monitoring system (count of M5)

  • M12 = Count of network perimeters not covered by at least one network perimeter monitoring system (count of M6)

Metrics

Coverage

Metric

The ratio of covered network perimeters to the total number of network perimeters

Calculation

M11 / M8

Perimeter Monitoring Configuration Coverage

Metric

The ratio of appropriately configured network perimeter monitoring systems to the total
number of network perimeter monitoring systems

Calculation

M9 / M7