12.2: Scan for Unauthorized Connections Across Trusted Network Boundaries

CSF v1.1 References:

PF v1.0 References:

Threats Addressed:


Control Statement

Perform regular scans from outside each trusted network boundary to detect any unauthorized connections which are accessible across the boundary.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]