11.3: Use Automated Tools to Verify Standard Device Configurations and Detect Changes

CSF v1.1 References:

PF v1.0 References:

Threats Addressed:

Group:

Info icon.

The next version of the control set incorporates all or part of this control into: 4.2: Establish and Maintain a Secure Configuration Process for Network Infrastructure.

Control Statement

Compare all network device configuration against approved security configurations defined for each network device in use, and alert when any deviations are discovered.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]