Skip to main content
โ† All controls
AC-4 / SC-7 / A.13.1.3 / CIS-12.2 NIST SP 800-53 Rev 5

Network access limited to need-to-know subnets

Demonstrate that network access controls restrict connectivity between subnets to only those pathways explicitly required by business or technical function, preventing unauthorized lateral movement.

Description

What this control does

This control enforces network segmentation such that systems and users can only access network subnets required for their authorized functions, preventing lateral movement and limiting the blast radius of compromised credentials or systems. Implementation typically involves VLAN segregation, firewall rulesets, access control lists (ACLs) on routers and switches, and software-defined network policies that permit traffic only between specific source and destination subnets based on role, function, or data classification. This principle of least privilege at the network layer reduces the attack surface by denying unnecessary connectivity between workstations, servers, development environments, production zones, and administrative segments.

Control objective

What auditing this proves

Demonstrate that network access controls restrict connectivity between subnets to only those pathways explicitly required by business or technical function, preventing unauthorized lateral movement.

Associated risks

Risks this control addresses

  • Compromised workstation or server allows attacker to pivot freely across flat network and access sensitive databases, file shares, or administrative systems
  • Malware infection spreads rapidly across multiple subnets due to unrestricted broadcast domains or SMB/RDP connectivity
  • Insider threat actor accesses payroll, HR, or financial systems from standard user network segments without technical enforcement
  • External attacker who gains foothold in DMZ directly reaches internal corporate network or OT/ICS segments
  • Development or test environments with weaker security posture serve as springboard into production subnets
  • Unauthorized network scanning or reconnaissance activities go undetected due to lack of inter-subnet traffic monitoring
  • Compliance violations occur when cardholder data, PHI, or other regulated data environments remain accessible from non-compliant network zones

Testing procedure

How an auditor verifies this control

  1. Obtain current network topology diagrams showing subnet boundaries, VLAN assignments, security zones, and trust boundaries
  2. Export firewall rulesets, router ACLs, and switch port security configurations governing inter-subnet traffic flows
  3. Identify a representative sample of subnets spanning user workstations, application servers, databases, management networks, and DMZ segments
  4. For each sampled subnet, trace permitted ingress and egress rules to identify which other subnets are reachable and the protocols/ports allowed
  5. Interview network administrators and system owners to document the business or technical justification for each permitted inter-subnet pathway
  6. Conduct network connectivity tests from sampled source hosts attempting to reach systems in subnets that should be blocked (e.g., workstation to database VLAN, guest WiFi to internal servers)
  7. Review change management records for network ACL and firewall rule modifications to verify approval and need-to-know justification documentation
  8. Examine SIEM or network flow logs to identify any unauthorized traffic patterns between subnets that should be segregated
Evidence required Network topology diagrams with subnet and VLAN labeling, firewall configuration exports showing inter-zone rulesets, router and switch ACL configurations, network connectivity test results demonstrating blocked and permitted paths, change management tickets for firewall rule additions with business justification, SIEM or NetFlow logs showing inter-subnet traffic patterns, and documented access matrix mapping subnets to authorized communication partners.
Pass criteria All tested inter-subnet connections align with documented business or technical requirements, unauthorized connectivity attempts are blocked by network controls, and all firewall rules or ACLs permitting inter-subnet traffic have documented justifications tied to specific roles or system functions.

Where this control is tested

Audit programs including this control