SC-07 (10) System and Communications Protection - Boundary Protection Prevent Unauthorized Exfiltration

Last modified: May 22, 2026

Introduction

This document describes how Private Mendix Platform fulfills the SC-07 (10) control.

Control ID SC-07 (10)
Control category SC - System and Communications Protection
Requirement baseline FEDRAMP MODERATE
Responsibility and ownership Customer - Infra, Customer - Org

Control

The organization prevents the unauthorized exfiltration of information across managed interfaces.

Supplemental Guidance

Safeguards implemented by organizations to prevent unauthorized exfiltration of information from information systems include, for example:

  • Strict adherence to protocol formats

  • Monitoring for beaconing from information systems

  • Monitoring for steganography

  • Disconnecting external network interfaces except when explicitly needed

  • Disassembling and reassembling packet headers

  • Employing traffic profile analysis to detect deviations from the volume/types of traffic expected within organizations or call backs to command and control centers.

    Devices enforcing strict adherence to protocol formats include, for example, deep packet inspection firewalls and XML gateways. These devices verify adherence to protocol formats and specifications (for example, file formats) and detect traffic anomalies.

The following controls are related to this control:

  • SI-3

For more information, refer to the NIST Special Publications 800-41, and 800-77.

Responsibility

Customer Responsibility

It is the customer's responsibility to provide requirements for unauthorized exfiltration controls.

Guidance

Customer Responsibility

The customer is responsible for implementing safeguards to prevent unauthorized exfiltration, including:

  • Defining requirements for preventing unauthorized data exfiltration.
  • Implementing deep packet inspection firewalls or XML gateways.
  • Monitoring for beaconing and command-and-control traffic.
  • Employing traffic profile analysis to detect anomalies.
  • Monitoring for steganography techniques.
  • Implementing data loss prevention (DLP) solutions.
  • Enforcing strict adherence to protocol formats.

Implementer Responsibilities

  • Infra Implementer: Ensure the infrastructure adheres to exfiltration prevention controls.
  • Infra Implementer: Deploy and configure DLP, firewall, and monitoring tools as directed by the customer.
  • App Implementer: Ensure the Mendix App adheres to exfiltration prevention controls.
  • App Implementer: Implement proper authorization and access controls to prevent data leakage.

Operator Responsibilities

  • Infra Operator: Ensure ongoing compliance with exfiltration prevention controls.
  • Infra Operator: Monitor for suspicious traffic patterns indicating potential exfiltration.
  • App Operator: Ensure ongoing compliance with access controls and data protection measures.

Proof and Remarks

The system utilizes Istio sidecar proxies as managed interfaces for all outbound communications, ensuring that traffic is intercepted for protocol validation and telemetry collection to support anomaly detection.

The presence of the BlackHoleCluster and PassthroughCluster within the Envoy configuration demonstrates that all outbound traffic is processed through an internal routing table, allowing the system to either permit or sinkhole traffic based on defined security constraints.

The application pod is in full synchronization with the Istio control plane, ensuring all traffic is intercepted by a managed interface governed by current security configurations.