2.10: Physically or Logically Segregate High Risk Applications
Threats Addressed:
Group:
The next version of the control set incorporates all or part of this control into: 3.12: Segment Data Processing and Storage Based on Sensitivity.
Control Statement
Physically or logically segregated systems should be used to isolate and run software that is required for business operations but incurs higher risk for the organization.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]