Back

Record network ports for applicable assets in the asset inventory.


CONTROL ID
13730
CONTROL TYPE
Establish/Maintain Documentation
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Establish, implement, and maintain an asset inventory., CC ID: 06631

There are no implementation support Controls.


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • the type of network connection and network address. (§ 8.1.4 ¶ 2 Bullet 7, BSI-Standard 200-2 IT-Grundschutz Methodology, Version 1.0)
  • Associate active ports, services and protocols to the hardware assets in the asset inventory. (CIS Control 9: Sub-Control 9.1 Associate Active Ports, Services and Protocols to Asset Inventory, CIS Controls, 7.1)
  • Associate active ports, services and protocols to the hardware assets in the asset inventory. (CIS Control 9: Sub-Control 9.1 Associate Active Ports, Services and Protocols to Asset Inventory, CIS Controls, V7)
  • The organization's asset inventory includes maps of network resources, as well as connections with external and mobile resources. (ID.AM-3.3, CRI Profile, v1.2)
  • The organization's asset inventory includes maps of network resources, as well as connections with external and mobile resources. (ID.AM-3.3, Financial Services Sector Cybersecurity Profile, Version 1.0.0)
  • All Mission Owners are required to register all Cloud based systems/applications; their CSP/CSO, MCD, and connection method in the DISA Systems/Network Approval Process (SNAP) database Cloud Module. This registration will enable these systems/applications to be connected to the DISN and is crucial f… (Section 5.17.1 ¶ 1, Department of Defense Cloud Computing Security Requirements Guide, Version 1, Release 3)
  • These route advertisements must be aggregated to /24 or larger blocks in support of current DISN capabilities. Although changes are to be expected over time, the frequency of changes to the list must be minimal to lessen the management burden on DISA Operators, and to reduce network service disrupti… (Section 5.10.4.1 ¶ 8 Bullet 1, sub-bullet 1, Department of Defense Cloud Computing Security Requirements Guide, Version 1, Release 3)
  • Appropriately controls networked devices by managing ports, protocols, and services and maps them to the devices on the technology asset inventory. (App A Objective 13:3e, FFIEC Information Technology Examination Handbook - Architecture, Infrastructure, and Operations, June 2021)