13.5: Monitor and Detect Any Unauthorized Use of Encryption
CSF v1.1 References:
Threats Addressed:
Group:
Control is withdrawn in the next version of this control set.
Control Statement
Monitor all traffic leaving the organization and detect any unauthorized use of encryption.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]