NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-7(2)Public Access

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Systems that the public can access must not sit on the same network segment as your internal systems. Public-facing services get their own isolated zone.

Example 1: Host your company website on a cloud platform (Azure App Service, AWS) or in a DMZ completely separated from your corporate LAN. If the website is compromised, the attacker has no direct path to your internal file servers or Active Directory.

Example 2: If you must host a customer portal on-premises, place it on a dedicated VLAN with strict firewall rules. The portal server cannot initiate connections to any internal system — it can only respond to specific API calls from an internal application server through a tightly controlled firewall rule.