12.2: Scan for Unauthorized Connections Across Trusted Network Boundaries
CSF v1.1 References:
PF v1.0 References:
Threats Addressed:
The next version of the control set incorporates all or part of this control into: 7.5: Perform Automated Vulnerability Scans of Internal Enterprise Assets, 7.6: Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets, 13.5: Manage Access Control for Remote Assets.
Control Statement
Perform regular scans from outside each trusted network boundary to detect any unauthorized connections which are accessible across the boundary.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]