SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
PR.AC-5.1
PR.AC-5.1: Firewalls shall be installed and activated on all the organization's networks.
  • Consider the following:
  • Install and operate a firewall between your internal network and the Internet. This may be a function of a (wireless) access point/router, or it may be a function of a router provided by the Internet Service Provider (ISP).
  • Ensure there is antivirus software installed on purchased firewall solutions and ensure that the administrator’s log-in and administrative password is changed upon installation and regularly thereafter.
  • Install, use, and update a software firewall on each computer system (including smart phones and other networked devices).
  • Have firewalls on each of your computers and networks even if you use a cloud service provider or a virtual private network (VPN). Ensure that for telework home network and systems have hardware and software firewalls installed, operational, and regularly updated.
  • Consider installing an Intrusion Detection / Prevention System (IDPS). These devices analyze network traffic at a more detailed level and can provide a greater level of protection.
Documentation Maturity
Implementation Maturity
Description

Firewalls shall be installed and activated on all the organization's networks.

PR.AC-5.2
PR.AC-5.2: Where appropriate, network integrity of the organization's critical systems shall be protected by incorporating network segmentation and segregation.
  • Consider creating different security zones in the network (e.g. Basic network segmentation through VLAN’s or other network access control mechanisms) and control/monitor the traffic between these zones.
  • When the network is "flat", the compromise of a vital network component can lead to the compromise of the entire network.
Documentation Maturity
Implementation Maturity
Description

Where appropriate, network integrity of the organization's critical systems shall be protected by incorporating network segmentation and segregation.