1.2.8—Configuration files for NSCs are: Secured from unauthorized access.
>Requirement Description
Configuration files for NSCs are: Secured from unauthorized access. Kept consistent with active network configurations. Applicability Notes Any file or setting used to configure or synchronize NSCs is considered to be a “configuration file.” This includes files, automated and system-based controls, scripts, settings, infrastructure as code, or other parameters that are backed up, archived, or stored remotely.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.