Under active development Content is continuously updated and improved

1.2.8Configuration files for NSCs are: Secured from unauthorized access.

>Requirement Description

Configuration files for NSCs are: Secured from unauthorized access. Kept consistent with active network configurations. Applicability Notes Any file or setting used to configure or synchronize NSCs is considered to be a “configuration file.” This includes files, automated and system-based controls, scripts, settings, infrastructure as code, or other parameters that are backed up, archived, or stored remotely.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.