Level N/A
Monitor, encrypt and restrict communications between environments to only authenticated and authorized connections, as justified by the business. Review these configurations at least annually, and support them by a documented justification of all allowed services, protocols, ports, and compensating controls.
Parent
Compliance Framework
CCM v4.0.10
Control Number
IVS-03
Related
Compliance Framework
CIS v8.0
CIS v8.0
CIS v8.0
CIS v8.0
CIS v8.0
ISO 27002:2022
ISO 27002:2022
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST CSF v1.1
NIST CSF v1.1
NIST CSF v1.1
NIST CSF v1.1
NIST CSF v1.1
NIST CSF v1.1
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
CIS v8.0