14.7: Enforce Access Control to Data Through Automated Tools
CSF v1.1 References:
PF v1.0 References:
Threats Addressed:
Group:
The next version of the control set incorporates all or part of this control into: 3.13: Deploy a Data Loss Prevention Solution.
Control Statement
Use an automated tool, such as host-based Data Loss Prevention, to enforce access controls to data even when data is copied off a system.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]