Skip to main content
← All controls
AC-4 / SC-7(21) / SI-4 NIST SP 800-53 Rev 5

Geo-blocking on the web tier

Demonstrate that the organization has implemented and maintains geo-blocking rules at the web tier that restrict inbound traffic from unauthorized geographic regions based on documented business requirements and threat intelligence.

Description

What this control does

Geo-blocking at the web tier restricts inbound HTTP/HTTPS traffic based on the geographic origin of the request, typically identified by source IP address GeoIP mapping. This control is implemented using web application firewalls (WAF), content delivery networks (CDNs), reverse proxies, or web server modules that compare client IP addresses against geolocation databases and enforce allow-lists or deny-lists by country, region, or autonomous system. Geo-blocking reduces attack surface by preventing access from jurisdictions with minimal legitimate user presence, high threat actor concentration, or jurisdictions from which the organization does not conduct business.

Control objective

What auditing this proves

Demonstrate that the organization has implemented and maintains geo-blocking rules at the web tier that restrict inbound traffic from unauthorized geographic regions based on documented business requirements and threat intelligence.

Associated risks

Risks this control addresses

  • Unauthorized access attempts originating from high-risk geographic regions known for state-sponsored or organized cybercrime activity
  • Credential stuffing and brute-force attacks launched from botnets concentrated in jurisdictions outside the organization's customer base
  • Data exfiltration by threat actors operating from sanctioned or embargoed countries where legal recourse is unavailable
  • Compliance violations when personal data is accessed from jurisdictions not covered by adequacy decisions or standard contractual clauses
  • Distributed denial-of-service (DDoS) attacks leveraging compromised infrastructure in regions with weak cybersecurity enforcement
  • Web application exploitation attempts from automated scanners and attack tools hosted in low-cost VPS providers in unmonitored regions
  • Bypass of geo-blocking controls due to stale GeoIP databases or misconfigured proxy/CDN forwarding headers revealing true client origin

Live threat patterns this control mitigates:

Testing procedure

How an auditor verifies this control

  1. Obtain and review the organization's documented geo-blocking policy, including authorized and blocked countries/regions, business justifications, and exception criteria.
  2. Identify all web-tier components implementing geo-blocking (WAF, CDN, reverse proxy, web server modules) and obtain their current configuration exports or screenshots of geo-blocking rules.
  3. Verify that geo-blocking rules align with the documented policy by comparing configured country allow-lists or deny-lists against policy requirements.
  4. Review logs or reports from the geo-blocking solution covering the past 30-90 days to confirm blocked connection attempts are recorded with source IP, resolved country code, timestamp, and requested resource.
  5. Select a sample of 5-10 blocked requests from high-risk regions and trace them to verify accurate geolocation identification and enforcement action (block, challenge, or alert).
  6. Test geo-blocking effectiveness by simulating connection attempts from blocked regions using VPN services or proxy networks and confirming denial or challenge mechanisms activate appropriately.
  7. Examine the GeoIP database version and update frequency to verify currency (updated at least monthly) and accuracy of geolocation mapping.
  8. Review change management records for the most recent modifications to geo-blocking rules to confirm approval, testing, and documentation of changes.
Evidence required Configuration exports from WAF, CDN, or reverse proxy platforms showing active geo-blocking rules, country codes, and enforcement actions. Access logs or security event logs spanning 30-90 days showing blocked connection attempts with source IP, GeoIP-resolved country, timestamp, and HTTP request details. Screenshots or policy documents listing authorized and blocked geographic regions, GeoIP database version and last update timestamp, and change control records for geo-blocking rule modifications within the past six months.
Pass criteria Geo-blocking rules are actively enforced at the web tier, align with documented policy, block or challenge traffic from unauthorized geographic regions as evidenced by configuration review and log analysis, utilize GeoIP databases updated at least monthly, and changes follow documented change management procedures.