3.12: Segment Data Processing and Storage Based on Sensitivity
CSF v1.1 References:
PF v1.0 References:
Threats Addressed:
Incorporates the following controls from the previous version: 2.10: Physically or Logically Segregate High Risk Applications, 14.1: Segment the Network Based on Sensitivity.
Control Statement
Segment data processing and storage based on the sensitivity of the data. Do not process sensitive data on enterprise assets intended for lower sensitivity data.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]