SAMMY UI is optimized for resolutions with a width 1024px and higher.
Network Security
IVS-03: Are communications between environments monitored?
Network communications justified by the business should be allowed, encrypted, and require authorization. Conversely, unjustified network communications should be disallowed.

Container application-aware network monitoring tools should be leveraged for:
a. Automated determination of proper container networking surfaces, including both inbound ports and process-port bindings.
b. Detection of traffic flows between containers and other network entities over both wire traffic and encapsulated traffic.
c. Detection of network anomalies—such as unexpected traffic flows within the organization’s network, port scanning, or outbound access to potentially dangerous destinations.
d. Detection of invalid or unexpected malicious processes—and data they introduce into the environment.
Control implemented
Control ownership
Description

Monitor, encrypt and restrict communications between environments to only authenticated and authorized connections, as justified by the business. Review these configurations at least annually, and support them by a documented justification of all allowed services, protocols, ports, and compensating controls.

Network Security
IVS-03: Are communications between environments encrypted?
Network communications justified by the business should be allowed, encrypted, and require authorization. Conversely, unjustified network communications should be disallowed.

Container application-aware network monitoring tools should be leveraged for:
a. Automated determination of proper container networking surfaces, including both inbound ports and process-port bindings.
b. Detection of traffic flows between containers and other network entities over both wire traffic and encapsulated traffic.
c. Detection of network anomalies—such as unexpected traffic flows within the organization’s network, port scanning, or outbound access to potentially dangerous destinations.
d. Detection of invalid or unexpected malicious processes—and data they introduce into the environment.
Control implemented
Control ownership
Description

Monitor, encrypt and restrict communications between environments to only authenticated and authorized connections, as justified by the business. Review these configurations at least annually, and support them by a documented justification of all allowed services, protocols, ports, and compensating controls.

Network Security
IVS-03: Are communications between environments restricted to only authenticated and authorized connections, as justified by the business?
Network communications justified by the business should be allowed, encrypted, and require authorization. Conversely, unjustified network communications should be disallowed.

Container application-aware network monitoring tools should be leveraged for:
a. Automated determination of proper container networking surfaces, including both inbound ports and process-port bindings.
b. Detection of traffic flows between containers and other network entities over both wire traffic and encapsulated traffic.
c. Detection of network anomalies—such as unexpected traffic flows within the organization’s network, port scanning, or outbound access to potentially dangerous destinations.
d. Detection of invalid or unexpected malicious processes—and data they introduce into the environment.
Control implemented
Control ownership
Description

Monitor, encrypt and restrict communications between environments to only authenticated and authorized connections, as justified by the business. Review these configurations at least annually, and support them by a documented justification of all allowed services, protocols, ports, and compensating controls.

Network Security
IVS-03: Are network configurations reviewed at least annually?
Network communications justified by the business should be allowed, encrypted, and require authorization. Conversely, unjustified network communications should be disallowed.

Container application-aware network monitoring tools should be leveraged for:
a. Automated determination of proper container networking surfaces, including both inbound ports and process-port bindings.
b. Detection of traffic flows between containers and other network entities over both wire traffic and encapsulated traffic.
c. Detection of network anomalies—such as unexpected traffic flows within the organization’s network, port scanning, or outbound access to potentially dangerous destinations.
d. Detection of invalid or unexpected malicious processes—and data they introduce into the environment.
Control implemented
Control ownership
Description

Monitor, encrypt and restrict communications between environments to only authenticated and authorized connections, as justified by the business. Review these configurations at least annually, and support them by a documented justification of all allowed services, protocols, ports, and compensating controls.

Network Security
IVS-03: Are network configurations supported by the documented justification of all allowed services, protocols, ports, and compensating controls?
Network communications justified by the business should be allowed, encrypted, and require authorization. Conversely, unjustified network communications should be disallowed.

Container application-aware network monitoring tools should be leveraged for:
a. Automated determination of proper container networking surfaces, including both inbound ports and process-port bindings.
b. Detection of traffic flows between containers and other network entities over both wire traffic and encapsulated traffic.
c. Detection of network anomalies—such as unexpected traffic flows within the organization’s network, port scanning, or outbound access to potentially dangerous destinations.
d. Detection of invalid or unexpected malicious processes—and data they introduce into the environment.
Control implemented
Control ownership
Description

Monitor, encrypt and restrict communications between environments to only authenticated and authorized connections, as justified by the business. Review these configurations at least annually, and support them by a documented justification of all allowed services, protocols, ports, and compensating controls.