Skip to main content

๐Ÿ’ผ CC6.6-4 Implements Boundary Protection Systems

Descriptionโ€‹

Boundary protection systems (for example, firewalls, demilitarized zones, and intrusion detection systems) are implemented to protect external access points from attempts and unauthorized access and are monitored to detect such attempts.

Similarโ€‹

  • Internal
    • ID: dec-c-80050f6e

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags