3.1.10. Configure the network perimeter to deny all incoming traffic




 

3.1.10. Configure the network perimeter to deny all incoming traffic that is not expressly permitted.

By limiting the types of incoming traffic, attackers should be able to reach fewer targets and should be able to reach the targets using designated protocols only. This should reduce the number of unauthorized access incidents.