2.10: Physically or Logically Segregate High Risk Applications

Threats Addressed:

Group:

Info icon.

The next version of the control set incorporates all or part of this control into: 3.12: Segment Data Processing and Storage Based on Sensitivity.

Control Statement

Physically or logically segregated systems should be used to isolate and run software that is required for business operations but incurs higher risk for the organization.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]