Network Infrastructure Management
Establish and maintain the secure configuration of network infrastructure devices, including firewalls, routers, and switches.
Why Is This Control Critical?
Secure network infrastructure is an essential defense against attacks, especially when data is moved across enterprise boundaries. Attackers can take advantage of vulnerabilities in network infrastructure, gain access, and then route all traffic to a system that allows them to monitor and record all network traffic. This allows the attacker to intercept credentials, redirect traffic to malicious sites, or inject malicious content. Network infrastructure changes are often made with less oversight and rigor than typical enterprise asset configurations. Organizations should ensure that the network infrastructure is securely configured and managed.
Related Policy Templates
Safeguards (8)
| ID | Title | Asset Type | Function | Implementation Groups |
|---|---|---|---|---|
| 12.1 | Ensure Network Infrastructure is Up>to>Date | Network | Protect |
IG1
IG2
IG3
|
| 12.2 | Establish and Maintain a Secure Network Architecture | Network | Protect |
IG2
IG3
|
| 12.3 | Securely Manage Network Infrastructure | Network | Protect |
IG2
IG3
|
| 12.4 | Establish and Maintain Architecture Diagram(s) | Network | Identify |
IG2
IG3
|
| 12.5 | Centralize Network Authentication, Authorization, and Auditing (AAA) | Network | Protect |
IG2
IG3
|
| 12.6 | Use of Secure Network Management and Communication ProtocolsĀ | Network | Protect |
IG2
IG3
|
| 12.7 | Ensure Remote Devices Utilize a VPN and are Connecting to an Enterpriseās AAA Infrastructure | Devices | Protect |
IG2
IG3
|
| 12.8 | Establish and Maintain Dedicated Computing Resources for All Administrative Work | Devices | Protect |
IG3
|