Skip to content

3.13.1 — Guard the Boundaries

Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems.

Two types of boundaries, both required:

External boundaries — where your network meets the internet or any network you don’t control. A perimeter firewall with IDS/IPS, configured to default-deny, logging all traffic.

Internal boundaries — where your CUI environment meets your non-CUI corporate network. This is where most companies fall short. A flat network where CUI systems sit on the same segment as general corporate devices is a finding.

For each boundary, the assessor checks three things:

  1. Is traffic controlled? — firewall rules restricting what can cross
  2. Is traffic monitored? — logging and alerting on boundary crossings
  3. Is traffic protected? — encryption where appropriate

The assessor will ask for your network diagram and walk through every boundary. If you can’t show where CUI traffic is separated from general traffic, you have a problem.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Are external boundaries of the system defined?Network diagram shows perimeter with firewall/IDS
2Are key internal boundaries defined?CUI zone separated from corporate zone with documented controls
3Are communications at external boundaries monitored and controlled?Perimeter firewall rules + traffic logging
4Are communications at key internal boundaries monitored and controlled?Internal segmentation with firewall rules + logging

Documents they’ll review: System and communications protection policy; procedures addressing boundary protection; system security plan; system design documentation; network diagrams; system configuration settings; system audit logs and records

People they’ll talk to: System or network administrators; personnel with information security responsibilities; system developers

Live demos they’ll ask for: Mechanisms implementing boundary protection; mechanisms for monitoring and controlling communications at boundaries


These are the actual questions. Have answers ready.

  • “Show me your network diagram. Where are the external and internal boundaries?”
  • “What controls exist at each boundary? Show me the firewall rules.”
  • “Is traffic monitored at both external and internal boundaries?”
  • “How is CUI traffic separated from general corporate traffic?”
  • “Show me a log entry of traffic crossing an internal boundary.”
  • “Are there any paths where CUI traffic can bypass boundary controls?”

Flat network. CUI systems on the same subnet as the break room smart TV. Segment your CUI environment with at least a VLAN and firewall rules.

External boundary only. Perimeter firewall exists but CUI and corporate systems share one network internally. Internal boundaries are required too.

Firewall but no monitoring. Rules are configured but nobody logs or reviews boundary traffic. Monitoring is half the requirement.

Network diagram doesn’t match reality. Diagram shows segmentation but a port scan reveals CUI systems are reachable from the corporate zone. Test your boundaries.



RequirementWhy it matters here
3.13.6 — Deny Everything by DefaultDefault-deny firewall rules at these boundaries
3.13.5 — DMZ for Public SystemsPublic-facing systems separated at the boundary
3.1.3 — Where CUI Can FlowInformation flow control enforced at these boundaries
3.14.6 — Watch the NetworkNetwork monitoring at and between boundaries

Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.


CMMC Practice ID: SC.L2-3.13.1 | SPRS Weight: 5 points | POA&M Eligible: No