NET-18.8 ยท Authenticated Proxy

Control Description

Mechanisms exist to force systems and processes to authenticate Internet-bound traffic with a proxy to enable user, group and/or location-aware security controls.

Control Question
Assessment question for control validation

Does the organization force systems and processes to authenticate Internet-bound traffic with a proxy to enable user, group and/or location-aware security controls?

Control Weighting
3
Validation Cadence
Annual
NIST CSF Function
Protect
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 3 - Tactical
Core Control Designations
Special designations and baseline inclusions
ESP Level 2: NET-18.8
ESP Level 3: NET-18.8