12.8: Deploy NetFlow Collection on Networking Boundary Devices
CSF v1.1 References:
Threats Addressed:
Next Version:
- Critical Security Controls Version 8:
- 13.6: Collect Network Traffic Flow Logs
Control Statement
Enable the collection of NetFlow and logging data on all network boundary devices.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]