1. Cybersecurity and Infrastructure Security Agency (CISA). (2017). Securing Network Infrastructure Devices. CISA. In the section "Restrict and Secure Management Interfaces
" the guide explicitly states
"Block access to the management interface from the internet. Protocols such as HTTP
HTTPS
SNMP
SSH
and Telnet should not be accessible from the internet." This directly supports blocking SNMP at the firewall.
2. National Institute of Standards and Technology (NIST). (2008). NIST Special Publication 800-123: Guide to General Server Security. Section 5.6
"Secure Remote Administration
" page 5-11. The document advises that "all remote administration should be performed over a secure channel" and recommends restricting access to management networks
which implicitly supports blocking general internet access to management protocols like SNMP.
3. University of California
Berkeley. Security Best Practices: Network. Berkeley Information Security Office. The guidelines recommend to "Block all unneeded ports at the firewall" and specifically list SNMP (ports 161/162) as a protocol that is "commonly scanned for" and should be firewalled from the Internet unless there is a specific business need.