9.3: Perform Regular Automated Port Scans
The next version of the control set incorporates all or part of this control into: 7.5: Perform Automated Vulnerability Scans of Internal Enterprise Assets, 7.6: Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets.
Control Statement
Perform automated port scans on a regular basis against all systems and alert if unauthorized ports are detected on a system.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]