CMMC RM.4.151 - Perform Network Port Scans

CMMC RM.4.151 - Perform Network Port Scans

Requirement text: RM.4.151: Perform scans for unauthorized ports available across perimeter network
boundaries over the organization’s Internet network boundaries and other organizationally defined boundaries.

DISCUSSION FROM SOURCE: CMMC
Adversaries constantly probe trusted boundaries, such as an organization’s perimeter with
the Internet, to find opportunities to create unauthorized connections. Organizations must
perform their own scans to determine if unauthorized connections are possible. To help
validate access control on network boundaries an organization will schedule actions, such as
scanning from various points of presence to assets on various network segment boundaries
to identify proper boundary access protections are in place and properly configured. This
allows the organization to identify if there are trusted network boundaries that may be
breached because of a misconfiguration, or due to the trust between one segment of an
environment and another. Basically, this means a one-to-many connection attempt from
each network boundary. Identifying the results of each test, where it was trying to access,
whether it was successful or not, time of day, IP addresses, etc. can all be used to determine
if the actions of the environment match the network protection design, i.e., whether an open
port is authorized or unauthorized.

CMMC CLARIFICATION
Organizations need to perform actions to validate the implementation of the enterprise
security architecture that restricts connections at trusted network boundaries. Mature
organizations design, implement, document their security mechanisms, and they perform
actions that help identify whether or not the security mechanisms are in place and working
as expected. Even the best security practitioners have been known to make a slight mistake
on a configuration of a security mechanism and find out later that the component is not
providing the protection necessary to keep the environment secure.

Example 1
Your organization has a data center that only allows connectivity from clients over HTTPS
web services. There is a firewall between the user network and the data center systems to
make sure this access to controlled. The firewall admin mistakenly placed a rule into the
system that allows a connection to HTTP services in the data center by users. This access
may allow someone to access specific systems and send passwords over in the clear, thus
exposing user credentials. Fortunately, a scan by corporate cyber services identifies this
allowed connectivity and emails a report to the admin of the firewall. The admin changes
the rule in the firewall and the access is stopped before anything bad happens.

Example 2
Your organization does not allow printers to initiate connectivity to any other environment
within the enterprise. There is a firewall that prevents this action from taking place. Only
user systems are allowed to initiate communication with printers. During routine checks, it
is identified that the printer network has the ability to initiate communication to the user
network as well as the data center. This could be bad if a printer becomes compromised.
The firewall team is alerted of this finding and the problem is thwarted before
communications are used in a manner undesired by the organization.

References
• CIS Controls v7.1 12.2
• NIST CSF v1.1 DE.CM-7
    • Related Articles

    • CMMC RM.2.142 - Perform Applications and Systems Vulnerability Scans

      Requirement text: RM.2.142: Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 ...
    • CMMC SC.5.230 - Enforce port and Protocol Compliance

      Requirement text: SC.5.230: Enforce port and protocol compliance. DISCUSSION FROM SOURCE: CMMC Malicious actors are able to perform command and control and exfiltration of data by running their own protocols over well-known ports or by hijacking ...
    • CMMC RM.3.144 - Perform Risk Assessments Periodically

      Requirement text: RM.3.144: Periodically perform risk assessments to identify and prioritize risks according to the defined risk categories, risk sources, and risk measurement criteria. DISCUSSION FROM SOURCE: NIST CSF V1.1 The organization ...
    • CMMC RM.2.143 - Remediate Vulnerabilities identified in Risk Assessments

      Requirement text: RM.2.143: Remediate vulnerabilities in accordance with risk assessments. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Vulnerabilities discovered, for example, via the scanning conducted in response to RM.2.142, are remediated ...
    • CMMC RM.4.149 - Employ Threat Profiling

      Requirement text: RM.4.149: Catalog and periodically update threat profiles and adversary TTPs. DISCUSSION FROM SOURCE: CMMC One method that more mature enterprises can use to protect its systems is to employ threat profiles and better understand ...