Skip to content

3.13.6 — Deny Everything by Default

Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).

Every firewall — perimeter, internal, host-based — must follow the same principle: block everything, then allow only what’s explicitly needed.

This applies to:

  • Inbound traffic — only approved services receive connections from outside
  • Outbound traffic — this is where most companies fail. If your outbound rules allow everything, an attacker who gets in can exfiltrate data freely
  • Internal traffic between zones — CUI zone to corporate zone, DMZ to internal

For each allowed flow, you should be able to answer:

  1. What — source, destination, port, protocol
  2. Why — business justification
  3. Who — who approved it
  4. When — when was it last reviewed

The assessor will review your firewall rules. Any ‘allow any any’ rule — especially between zones — is an instant finding. Legacy rules that nobody remembers creating are common problems.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Is network traffic denied by default?Last rule on all firewalls is deny-all
2Is network traffic allowed only by exception?Each allow rule is documented with source, destination, port, protocol, and justification
3Does this apply to both inbound and outbound?Outbound filtering is in place — not just inbound

Documents they’ll review: System and communications protection policy; system security plan; firewall rule sets; network diagrams; system configuration settings; firewall rule review records

People they’ll talk to: System or network administrators; personnel with information security responsibilities

Live demos they’ll ask for: Mechanisms implementing default-deny network policies; traffic blocked by default-deny rules


These are the actual questions. Have answers ready.

  • “Show me your firewall rules. What’s the last rule?”
  • “Are outbound connections filtered or is everything allowed out?”
  • “Walk me through three allow rules — what’s the business justification for each?”
  • “When were your firewall rules last reviewed? Show me the review record.”
  • “Are there any ‘allow any any’ rules? Where and why?”
  • “How do you handle requests for new firewall rules?”

Allow-by-default. The default action is ‘permit’ instead of ‘deny.’ Invert it on every firewall.

No outbound filtering. Inbound is locked down but any traffic can leave the network. An attacker can exfiltrate CUI freely.

Legacy ‘any any’ rules. Rules created years ago by someone no longer with the company. Nobody knows what they’re for but nobody dares delete them. Review and clean.

No rule documentation. Rules exist but nobody can explain what they’re for. Every rule needs a documented justification.

No periodic review. Rules accumulate over time. Without quarterly reviews, your firewall becomes increasingly permissive.



RequirementWhy it matters here
3.13.1 — Guard the BoundariesDefault-deny enforced at every boundary
3.13.5 — DMZ for Public SystemsDMZ-to-internal firewall rules must be default-deny
3.4.7 — Block What’s Not NeededDefault-deny principle applied to network traffic

🔒

Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.

Start a conversation →

CMMC Practice ID: SC.L2-3.13.6 | SPRS Weight: 5 points | POA&M Eligible: No