7.4: Maintain and Enforce Network-Based URL Filters

Enforce network-based URL filters that limit a system’s ability to connect to websites not approved by the organization. This filtering shall be enforced for each of the organization’s systems, whether they are physically at an organization’s facilities or not.

Asset Type

Security Function

Implementation Groups

Network

Protect

2, 3

Dependencies

  • Sub-control 2.5: Integration Software and Hardware Asset Inventories

  • Sub-control 5.1: Establish Secure Configurations

Inputs

  1. List of web clients/browsers installed in the organization by endpoint

  2. Approved configuration(s) covering each web browser/client in Input 1 indicating whether or not the browser must utilize URL filtering

Operations

  1. For each application instance (web browser/client) in Input 1, check the application’s configuration against the appropriate approved configuration(s) from Input 2.

  2. Create a list of the application instances that meet the approved configuration (M1)

  3. Create a list of the application instances that that do not meet the approved configuration (M2) noting each deviation.

Measures

  • M1 = List of application instances (web browser/client) that meet the approved configuration (compliant list)

  • M2 = List of application instances (web browser or email client) that do not meet the approved configuration (non-compliant list)

  • M3 = Count of compliant application instances (count of M1)

  • M4 = Count of non-compliant application instances (count of M2)

  • M5 = Total count of installed web browser and email client instances (count of Input 1)

Metrics

Coverage

Metric

Calculate the quality of URL-filter enforcement.

Calculation

M3 / M5