1. National Institute of Standards and Technology (NIST) Special Publication 800-171
Revision 2
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations.
Reference: Control 3.1.3
"Control the flow of CUI in accordance with approved authorizations." The discussion section states
"Flow control restrictions include... separating CUI into separate physical domains or logical domains (e.g.
subnets)." VLANs are a primary technology for implementing logical domains/subnets to control information flow. (Page 17)
2. Cybersecurity and Infrastructure Security Agency (CISA)
Network Segmentation Cheat Sheet.
Reference: The document outlines network segmentation as a key defensive strategy. It states
"Virtual Local Area Networks (VLANs) are the most common method of network segmentation... VLANs allow network administrators to partition their switched network based on functional requirements... regardless of the users’ physical location." This supports using VLANs to isolate devices like MFDs. (Page 1)
3. Carnegie Mellon University
Software Engineering Institute (SEI)
Network Segmentation and Segregation for Information System Protection
CMU/SEI-2016-TN-017.
Reference: Section 3.2
"Virtual Local Area Networks (VLANs)." This section describes VLANs as a fundamental technology for logical network segmentation to create security zones and control traffic between them using access control lists
directly aligning with the scenario. (Page 7)