12.5: Configure Monitoring Systems to Record Network Packets

CSF v1.1 References:

Threats Addressed:


Warning icon.

Control is withdrawn in the next version of this control set.

Control Statement

Configure monitoring systems to record network packets passing through the boundary at each of the organization’s network boundaries.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]