12.8: Deploy NetFlow Collection on Networking Boundary Devices

CSF v1.1 References:

Threats Addressed:

Group:

Next Version:

Control Statement

Enable the collection of NetFlow and logging data on all network boundary devices.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]