Under active development Content is continuously updated and improved

12.3Securely Manage Network Infrastructure

IG2
IG3
Network
Protect

>Control Description

Securely manage network infrastructure. Example implementations include version-controlled Infrastructure-as-Code (IaC), and the use of secure network protocols, such as SSH and HTTPS.

>Cross-Framework Mappings

>Relevant Technologies

Technology-specific guidance with authoritative sources and verification commands.

Ask AI

Configure your API key to use AI features.