NET-18.8—Authenticated Proxy
Weight: 3
>Control Description
Mechanisms exist to force systems and processes to authenticate Internet-bound traffic with a proxy to enable user, group and/or location-aware security controls.
>Cross-Framework Mappings
DHS TIC 3.0
Ask AI
Configure your API key to use AI features.