5.5: Implement Automated Configuration Monitoring Systems
CSF v1.1 References:
Threats Addressed:
Control is withdrawn in the next version of this control set.
Control Statement
Utilize a Security Content Automation Protocol (SCAP) compliant configuration monitoring system to verify all security configuration elements, catalog approved exceptions, and alert when unauthorized changes occur.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]