NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-7(1)Physically Separated Subnetworks

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Publicly accessible systems (web servers, email gateways) must sit on a physically separate network subnetwork from your internal systems. This is the classic DMZ architecture.

Example 1: Place your public web server on a DMZ segment with its own firewall interface. The firewall allows inbound HTTP/HTTPS from the internet to the DMZ but blocks all direct traffic from the internet to the internal network. The web server can make limited, specific connections to internal databases.

Example 2: Put your email gateway (Exchange Edge Transport or a Barracuda appliance) in the DMZ. Internet email flows into the DMZ, the gateway scans for malware and spam, then forwards clean mail to the internal Exchange server. No external mail server ever touches your internal network directly.