11.3: Use Automated Tools to Verify Standard Device Configurations and Detect Changes
PF v1.0 References:
Threats Addressed:
The next version of the control set incorporates all or part of this control into: 4.2: Establish and Maintain a Secure Configuration Process for Network Infrastructure.
Control Statement
Compare all network device configuration against approved security configurations defined for each network device in use, and alert when any deviations are discovered.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]