Skip to content

3.13.5 — DMZ for Public Systems

Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.

Any system reachable from the internet must be in a DMZ — a separate network zone between the internet and your internal network. The DMZ is the sacrificial zone: if a public-facing system is compromised, the attacker is trapped in the DMZ and can’t reach CUI systems directly.

What goes in the DMZ:

  • Web servers
  • Email gateways
  • VPN concentrators
  • Any system with a public IP

What stays out of the DMZ:

  • CUI databases
  • File servers
  • Internal applications
  • Directory services (AD)

The firewall between the DMZ and the internal network should be strict: only the specific ports and protocols needed for the public-facing service to function. No “allow all” rules between DMZ and internal.

If you don’t have any public-facing systems (everything is cloud-hosted by a CSP), document that in your SSP. This requirement may be simpler than you think.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Are publicly accessible system components identified?List of all internet-facing systems
2Are public-facing components in subnetworks separated from internal networks?DMZ exists with firewall between it and internal CUI network
3Is the separation physical or logical?Network diagram shows DMZ zone with distinct subnet and firewall rules

Documents they’ll review: System and communications protection policy; system security plan; network diagrams; system design documentation; system configuration settings showing DMZ configuration; firewall rules between DMZ and internal

People they’ll talk to: System or network administrators; personnel with information security responsibilities

Live demos they’ll ask for: Mechanisms implementing DMZ separation; firewall rules between DMZ and internal networks


These are the actual questions. Have answers ready.

  • “Do you have any publicly accessible systems? Where do they sit?”
  • “Show me your DMZ on the network diagram.”
  • “What firewall rules exist between the DMZ and internal network?”
  • “Can a system in the DMZ directly access your CUI database?”
  • “What happens if a public-facing system is compromised — can the attacker reach CUI?”

No DMZ. Public-facing systems on the same network as CUI. Classic architecture failure.

DMZ rules too permissive. DMZ firewall allows ‘any’ traffic to the internal network. Restrict to specific ports and IPs.

Direct database access from DMZ. Web server in DMZ connects directly to a SQL database containing CUI on the internal network. Use an application tier in between.

Cloud but no documentation. All public services are cloud-hosted but you haven’t documented that the requirement is satisfied by the CSP’s architecture.



RequirementWhy it matters here
3.13.1 — Guard the BoundariesDMZ is an internal boundary that must be monitored
3.13.6 — Deny Everything by DefaultDMZ-to-internal firewall rules must be default-deny
3.1.22 — Keep CUI Off Public SystemsPublic systems in the DMZ must never contain CUI

Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.


CMMC Practice ID: SC.L2-3.13.5 | SPRS Weight: 5 points | POA&M Eligible: No