SC-7(2): Public Access
SC-7(2): Public Access requires you to tightly control and segment any system components that are accessible from the public internet, so public-facing services cannot directly reach internal networks or sensitive system components. Operationalize it by inventorying all public entry points, placing them in controlled boundary zones, enforcing least-privilege flows, and retaining evidence that the segmentation is designed, implemented, and monitored. 1
Key takeaways:
- Treat every internet-exposed service as a controlled boundary with explicit, documented traffic rules and strong isolation from internal networks.
- Your audit win condition is evidence: diagrams, firewall/WAF rules, allowlists, and verification results that show public-to-internal paths are prevented.
- Make “public access” a repeatable process: new public endpoints must go through design review, security testing, and change control.
SC-7 is the NIST SP 800-53 family control for boundary protection; enhancement (2) focuses specifically on public access. In practice, assessors read “Public Access” as a segmentation and exposure-management requirement: if something is reachable from the internet, it must sit behind a boundary that limits what it can talk to, what can talk to it, and how that access is monitored and changed.
For a Compliance Officer, CCO, or GRC lead, the fastest path is to translate SC-7(2) into an operating model with clear ownership. Someone must own the inventory of public endpoints; someone must own the network/security controls that enforce separation; and you must be able to prove, on demand, that public-facing components cannot laterally move into internal environments without tightly controlled, explicitly authorized pathways.
This page gives requirement-level implementation guidance you can hand to security/network teams and then audit with confidence: what to build, what to document, what evidence to retain, and how exams typically probe this control. Primary references: the NIST SP 800-53 Rev. 5 catalog and overview materials. 2
What SC-7(2): Public Access means (plain English)
The sc-7(2): public access requirement expects you to prevent “internet-reachable” from becoming “internally trusted.” Public access should terminate in a controlled zone (logical or physical) with explicit, minimal connections to internal systems. You should be able to show that:
- You know every public entry point you expose (web apps, APIs, VPN portals, email gateways, DNS, SFTP, remote admin, cloud load balancers).
- Those entry points sit behind boundary protections (firewalls, security groups, WAF/reverse proxies, gateways) with restrictive rules.
- Connections from public-facing components to internal systems are intentionally designed, reviewed, approved, and monitored.
This is less about buying a specific tool and more about proving controlled architecture and disciplined change management around exposure.
Regulatory text
Excerpt (as provided): “NIST SP 800-53 control SC-7.2.” 3
Operator interpretation: Implement boundary protections for publicly accessible components and demonstrate effective isolation between public-facing services and internal networks/components. Your documentation and evidence should let an assessor trace: public endpoint → boundary control(s) → allowed flows → monitoring and change control. 1
Who it applies to
Entity scope
- Federal information systems.
- Contractor systems handling federal data (including cloud and SaaS environments supporting federal workloads). 1
Operational scope (where it shows up)
- Internet-facing applications and APIs (including SaaS front doors).
- Perimeter and remote access (VPN, ZTNA portals, bastions, jump hosts).
- Cloud ingress (internet gateways, ALBs/ELBs, API gateways, public buckets with endpoints, public IPs).
- “Shadow exposure” created by third parties: embedded support tools, outsourced web hosting, CDN/WAF providers, managed DNS.
If your ATO boundary, SSP boundary, or system boundary includes anything public-facing, SC-7(2) is in play.
What you actually need to do (step-by-step)
Use this as an execution checklist you can assign and track.
1) Build and maintain an inventory of public access paths
- Enumerate all public DNS names and public IPs tied to the system boundary.
- Enumerate all cloud resources marked public or internet-routable (security groups, network ACLs, gateways, load balancers).
- Include third-party-managed endpoints that route into your environment (support portals, embedded chat widgets with admin access paths, externally hosted SFTP that lands data internally).
Output: “Public Access Register” with owner, purpose, data sensitivity, and upstream/downstream dependencies.
2) Define the approved public access architecture pattern(s)
Pick a small set of patterns and forbid everything else by policy. Common patterns:
- Reverse proxy/WAF → app tier in DMZ/subnet → internal services via explicit allowlist
- API gateway → service mesh/ingress controls → internal services via mTLS + authZ
- Remote admin via bastion/jump host only; no direct admin ports exposed
Output: Reference architecture diagram(s) and a short standard that says “public endpoints must conform to these patterns.”
3) Enforce segmentation and default-deny rules at the boundary
Have security/network engineering implement:
- Default deny inbound from the internet, allow only required ports/protocols.
- Default deny outbound from public-facing tiers to internal networks, allow only documented dependencies (for example, app-to-database on a specific port to a specific subnet).
- Administrative access paths separated from user paths (separate management plane, separate auth, separate network path).
Output: Firewall/security group rule sets mapped to each registered public endpoint.
4) Add layered boundary protections appropriate to the exposure
Depending on what is exposed, require one or more of:
- WAF/reverse proxy for web traffic.
- DDoS protections where relevant.
- TLS policies and certificate management.
- Strong authentication and authorization for any non-public content; no “hidden URL equals auth.”
- Rate limiting and abuse monitoring for APIs.
Output: Configuration baselines and screenshots/exports showing control enablement.
5) Instrument monitoring and detection for boundary events
- Centralize logs for boundary devices/services (WAF logs, firewall logs, gateway logs, load balancer access logs).
- Alert on “newly opened paths” (rule changes, new listeners, new public IPs, new DNS records).
- Alert on suspicious inbound patterns and unexpected outbound connections from public-facing tiers.
Output: SIEM queries/alerts list, sample alerts, and evidence of log ingestion.
6) Gate public exposure through change management
Make it hard to accidentally become public:
- Require security review for any new internet-exposed service or rule change.
- Require architectural sign-off that segmentation is in place and tested.
- Require validation testing (port scans from outside, attempted connections from DMZ to internal that should fail).
Output: Change tickets, approvals, and test results attached to each change.
7) Verify control effectiveness (prove the negative)
Assessors will ask how you know segmentation works. Build repeatable checks:
- External scan results (what is reachable).
- Internal reachability tests (public tier cannot reach internal except allowlisted).
- Cloud posture checks for public exposure drift.
Output: Periodic verification report with exceptions and remediation tickets.
Required evidence and artifacts to retain
Keep evidence in a form an auditor can re-perform or at least validate:
| Evidence artifact | What it proves | Owner |
|---|---|---|
| Public Access Register | You know what is public and why | GRC + Network/SecOps |
| Network/data flow diagrams (public-to-internal) | Segmentation design and trust boundaries | Architecture |
| Firewall/WAF/security group exports | Default-deny and explicit allow rules | Network/SecOps |
| Config baselines/standards | Consistent implementation expectations | Security Eng |
| Logging + alert definitions | Ongoing monitoring of boundary activity and changes | SecOps |
| Change tickets for exposure changes | Public access is controlled and reviewed | ITSM owner |
| Verification results (scans/tests) | Controls work, not just “documented” | Security testing |
If you use Daydream to manage control readiness, map SC-7(2) to a named control owner, a short operating procedure, and a recurring evidence list so this doesn’t turn into a quarterly scramble. 1
Common exam/audit questions and hangups
Expect these lines of questioning:
- “Show me everything internet-accessible in scope.” They will compare your list to DNS, cloud consoles, and scan results.
- “Where is the trust boundary?” If your diagram is vague, you will lose time.
- “Prove the public tier can’t talk to internal networks broadly.” “We think it can’t” fails; show rules and test evidence.
- “How do you prevent accidental exposure?” They will look for change control gates and detective monitoring for drift.
- “What about third parties?” If a third party hosts a component or provides an admin backdoor, you still need to show boundary controls and approvals.
Hangup: teams often document “the firewall exists” but cannot show rule intent, ownership, review cadence, or testing.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Treating “public access” as only inbound filtering.
Fix: Control outbound from public-facing components as aggressively as inbound. Document allowed internal dependencies and deny everything else. -
Mistake: No single inventory of public endpoints.
Fix: Maintain a register tied to DNS + cloud resource discovery + change management. Make the register the source of truth for audits. -
Mistake: Flat networks in cloud (shared subnets, permissive security groups).
Fix: Separate public subnets/tiering, restrict east-west, and require explicit allowlists between tiers. -
Mistake: Admin interfaces exposed “temporarily.”
Fix: Create a standard for admin access (bastion/ZTNA) and block direct exposure by policy and technical guardrails. -
Mistake: Evidence is scattered across consoles.
Fix: Export configs and attach them to the control record on a recurring basis. Daydream-style evidence mapping keeps ownership and refresh cycles clear. 1
Risk implications (why operators get burned)
SC-7(2) failures usually surface as:
- Unintended internet exposure (a resource becomes public without review).
- Lateral movement from a compromised public-facing service to internal systems due to permissive routing or overly broad security group rules.
- Inability to demonstrate control operation during an assessment, even if the architecture is “mostly right.”
The immediate risk is technical compromise; the compliance risk is an assessment finding for boundary protection and inadequate evidence of implementation and effectiveness. 1
Practical 30/60/90-day execution plan
First 30 days (stabilize and get audit-ready basics)
- Assign a single control owner and technical owners (network/security/cloud).
- Produce the Public Access Register from DNS, IP ranges, and cloud inventories.
- Collect current-state diagrams and boundary rule exports for each public endpoint.
- Identify and ticket “critical exposure gaps” (public admin ports, overly permissive inbound/outbound, unknown endpoints).
Days 31–60 (standardize and enforce)
- Publish approved public access patterns and a short standard for teams to follow.
- Implement default-deny inbound/outbound templates for public tiers (firewall rules, security groups).
- Put exposure changes behind security review in ITSM.
- Stand up monitoring for new public endpoints and rule changes; route alerts to an owned queue.
Days 61–90 (prove effectiveness and operationalize)
- Run repeatable verification (external reachability, segmentation tests, cloud drift checks) and store results as evidence.
- Add quarterly (or other defined cadence) rule review with sign-off and exception handling.
- Close the loop: link register entries to diagrams, rules, change tickets, and verification results in your GRC system so the control stays assessable.
(Plan phases are implementation guidance, not a cited timeframe requirement.)
Frequently Asked Questions
Does SC-7(2) mean we can’t have any internet-facing systems?
You can have internet-facing services, but they must be isolated behind boundary protections with explicit, minimal allowed connections to internal components. The focus is controlled exposure and segmentation. 1
What counts as “public access” in cloud environments?
Any resource reachable from the public internet: public IPs, internet-facing load balancers, public API gateways, public storage endpoints, and externally reachable admin portals. Track them in an inventory tied to cloud configuration evidence. 1
Do we need a DMZ to satisfy the sc-7(2): public access requirement?
You need equivalent isolation. In cloud, this is often separate subnets/accounts/projects plus restrictive security groups and routing. The assessor cares about enforced separation and proof, not the word “DMZ.” 1
What evidence is most persuasive to an auditor?
A complete endpoint inventory, clear boundary/data flow diagrams, exported rule sets showing default-deny with explicit allowlists, and verification results that demonstrate blocked paths. Tie each artifact to the specific public endpoint. 1
How do we handle third-party services that connect into our environment?
Treat the third party connection as a public access path if it is externally reachable or provides an ingress route. Require documented approved flows, strong authentication, monitoring, and change control for any connectivity into internal systems. 1
We already have a WAF. Are we done?
A WAF addresses part of inbound web risk, but SC-7(2) also expects segmentation, restricted internal connectivity, monitoring, and controlled changes for all public entry points. You still need rule evidence and effectiveness testing. 1
Footnotes
Frequently Asked Questions
Does SC-7(2) mean we can’t have any internet-facing systems?
You can have internet-facing services, but they must be isolated behind boundary protections with explicit, minimal allowed connections to internal components. The focus is controlled exposure and segmentation. (Source: NIST SP 800-53 Rev. 5)
What counts as “public access” in cloud environments?
Any resource reachable from the public internet: public IPs, internet-facing load balancers, public API gateways, public storage endpoints, and externally reachable admin portals. Track them in an inventory tied to cloud configuration evidence. (Source: NIST SP 800-53 Rev. 5)
Do we need a DMZ to satisfy the sc-7(2): public access requirement?
You need equivalent isolation. In cloud, this is often separate subnets/accounts/projects plus restrictive security groups and routing. The assessor cares about enforced separation and proof, not the word “DMZ.” (Source: NIST SP 800-53 Rev. 5)
What evidence is most persuasive to an auditor?
A complete endpoint inventory, clear boundary/data flow diagrams, exported rule sets showing default-deny with explicit allowlists, and verification results that demonstrate blocked paths. Tie each artifact to the specific public endpoint. (Source: NIST SP 800-53 Rev. 5)
How do we handle third-party services that connect into our environment?
Treat the third party connection as a public access path if it is externally reachable or provides an ingress route. Require documented approved flows, strong authentication, monitoring, and change control for any connectivity into internal systems. (Source: NIST SP 800-53 Rev. 5)
We already have a WAF. Are we done?
A WAF addresses part of inbound web risk, but SC-7(2) also expects segmentation, restricted internal connectivity, monitoring, and controlled changes for all public entry points. You still need rule evidence and effectiveness testing. (Source: NIST SP 800-53 Rev. 5)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream