12.5: Configure Monitoring Systems to Record Network Packets
CSF v1.1 References:
Threats Addressed:
Control is withdrawn in the next version of this control set.
Control Statement
Configure monitoring systems to record network packets passing through the boundary at each of the organization’s network boundaries.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]