3.5.3.3—Network Security and Segmentation
>Control Description
Limit exploitable services on the Internet, establish a hardware and software approval process, collect and securely store logs for intrusion detection and incident response, and segment OT device networks from IT networks. Ensure security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.