13.5: Monitor and Detect Any Unauthorized Use of Encryption

CSF v1.1 References:

Threats Addressed:


Warning icon.

Control is withdrawn in the next version of this control set.

Control Statement

Monitor all traffic leaving the organization and detect any unauthorized use of encryption.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]