13.6: Collect Network Traffic Flow Logs
CSF v1.1 References:
Previous Version:
- Critical Security Controls Version 7.1:
- 12.8: Deploy NetFlow Collection on Networking Boundary Devices
Control Statement
Collect network traffic flow logs and/or network traffic to review and alert upon from network devices.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]