18.4: Only Use Up-to-Date and Trusted Third-Party Components
- Critical Security Controls Version 8:
- 16.5: Use Up-to-Date and Trusted Third-Party Software Components
Only use up-to-date and trusted third-party components for the software developed by the organization.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]