Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls. Which of the following controls BEST matches this control description?
lorelai007007
1 month agosai_murthy
6 months, 3 weeks agopaulnghw
8 months, 2 weeks agoa5g
1 year, 4 months agoME79
1 year, 5 months agoME79
1 year, 5 months ago