Under active development Content is continuously updated and improved

3.5.3.3Network Security and Segmentation

>Control Description

Limit exploitable services on the Internet, establish a hardware and software approval process, collect and securely store logs for intrusion detection and incident response, and segment OT device networks from IT networks. Ensure security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.