🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Move from Policy to Production: Deploy Deny-by-Default Network Controls for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.6 in 8 Practical Steps

Step-by-step guide to implement deny-by-default network controls required by NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 SC.L2-3.13.6, with practical examples for small businesses and technical rule templates.

•
March 29, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Deny-by-default network controls (SC.L2-3.13.6) require that network access is blocked unless explicitly permitted — a critical step for organizations pursuing NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 compliance. This post walks you through eight practical steps to move from policy to production, with concrete technical examples, small-business scenarios, and compliance best practices so you can implement, test, and maintain a default-deny posture without breaking business operations.

Eight Practical Steps to Deploy Deny-by-Default Network Controls

Step 1 — Inventory and Categorize Network Flows and CUI Locations

Begin by identifying where Controlled Unclassified Information (CUI) exists (file shares, SaaS, endpoints) and mapping all network flows to and from those assets. For a small business (30 users, hybrid cloud), create a spreadsheet with source, destination, protocol, port, business owner, and justification. Use NetFlow, packet capture, or a host agent (like Zeek or an EDR agent) to observe baseline traffic for 2–4 weeks so you can build accurate allowlists instead of guesswork.

Step 2 — Define Zones and Segmentation (Perimeter, DMZ, CUI Zone, Management)

Design a simple zone model: Internet, Perimeter/DMZ, Corporate (user VLANs), CUI Zone (restricted VLAN/subnet), and Management. For small organizations, VLANs + ACLs on the edge switch and a host-based firewall (Windows Firewall, iptables/nftables) on servers is often sufficient. Example: put file servers holding CUI in VLAN 20, only allow TCP 445 from the corporate subnet 10.0.10.0/24 through an ACL; block inter-VLAN traffic by default.

Step 3 — Build Explicit Permit Rules and Set Default-Deny

Implement default-deny at each enforcement point: perimeter firewall, internal firewalls, host firewalls, and cloud security groups. Technical examples: for Linux hosts using iptables: iptables -P INPUT DROP; iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT; iptables -A INPUT -i lo -j ACCEPT; iptables -A INPUT -p tcp --dport 22 -s 203.0.113.5 -j ACCEPT. For Windows via GPO: set "Inbound default action" to Block and create outbound rules only for approved services or use "Block" outbound and create specific Allow rules for tighter control.

Step 4 — Harden Egress Controls and DNS Filtering

Default-deny must include egress controls to prevent data exfiltration. Allow only necessary outbound ports (e.g., 53 UDP/TCP to internal DNS proxies, 80/443 for permitted SaaS, 123 for NTP to trusted servers) and block broad high-risk destinations. Example firewall egress ACL: permit TCP/443 to cloud-saas-ips, permit UDP/53 to internal DNS resolver, deny all else. Add DNS filtering (internal DNS forwarder with policy) to block data-leak domains and enforce hostname allowlists where possible.

Step 5 — Implement Change Control, Rule Naming, and Documentation

Every rule must have a clear name, owner, justification, and expiration review date. Use your change management system to propose, test, and approve rule changes. Example naming convention: "ALLOW_CUI_VLAN20_TO_FILESVC_445_ADMIN_TEAM_JAN2026". Keep a canonical policy document mapping each rule to a business function and to the specific part of SC.L2-3.13.6 so auditors can trace decisions to controls.

Step 6 — Staging, Testing, and Break-Glass Procedures

Deploy rules first in a staging environment that mirrors production, then in a pilot group (e.g., IT and one team) before full rollout. Use automated tests: synthetic transactions for critical apps, firewall rule simulators, and scheduled unit tests that validate connectivity. Implement a break-glass plan: emergency rollback playbook, out-of-band admin access (console or dedicated management VLAN) and logging of all break-glass events to maintain audit trails.

Step 7 — Monitoring, Logging, and Continuous Validation

Centralize logs from firewalls, switches, host firewalls, and cloud security groups into a SIEM or log aggregator (Splunk, Elastic, or a managed service). Create alerts for denied flows to CUI assets, repeated outbound failures, and unusual management access. Schedule quarterly rule reviews and run automated drift detection (e.g., compare actual NetFlow to allowlists) to ensure the deny-by-default posture persists.

Step 8 — Operationalize: Training, Incident Response, and Vendor Controls

Train network admins, helpdesk, and system owners on the new posture — show them how to request temporary rule exceptions via change requests. Update your incident response runbooks to include workflows for suspected lateral movement and exfiltration attempts when deny-by-default blocks are observed. For third-party vendors with access to CUI, require least-privilege access, MFA, and documented justification for any explicit permits.

Practical Tips, Small-Business Scenarios, and Technical Best Practices

For a small business with limited staff and budget, leverage default-deny cloud constructs (AWS Security Groups and NACLs are deny-by-default) and host-based firewalls to reduce appliance costs. Use templates for rules and automation (IaC like Terraform) to apply consistent policies across environments. Prioritize protecting CUI hosts first; if you must phase in, start with egress blocking to reduce exfiltration risk. Regularly export rule-sets and use diff tools to make reviews quick and auditable.

Not implementing deny-by-default controls increases the risk of lateral movement, data exfiltration, ransomware spread, and ultimately loss of DoD contracts or certification failures. A permissive network allows attackers to pivot from a single compromised endpoint to CUI systems; regulators view lack of network segmentation and default-deny as a severe control gap under SC.L2-3.13.6.

In summary, move from policy to production by: inventorying flows, segmenting networks, implementing explicit permit rules with default-deny at all enforcement points, staging and testing changes, and operationalizing monitoring and governance. With clear documentation, automated checks, and a conservative rollout approach, small organizations can meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requirements while keeping business continuity intact.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes