NET-04.14 · Application Proxy

Control Description

Mechanisms exist to terminate, inspect, control and reinitiate application traffic, regardless of the user’s location or the security posture of the surrounding network.

Control Question
Assessment question for control validation

Does the organization maintain visibility and control over application traffic, regardless of the user’s location or the security posture of the surrounding network?

Control Weighting
7
Validation Cadence
Annual
NIST CSF Function
Protect
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 2 - Operational
Tier 3 - Tactical