13.3: Monitor and Block Unauthorized Network Traffic
CSF v1.1 References:
PF v1.0 References:
Threats Addressed:
Group:
The next version of the control set incorporates all or part of this control into: 3.13: Deploy a Data Loss Prevention Solution.
Control Statement
Deploy an automated tool on network perimeters that monitors for unauthorized transfer of sensitive information and blocks such transfers while alerting information security professionals.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]