Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls. Which of the following controls BEST matches this control description?
- Network Security
- Change Detection
- Virtual Instance and OS Hardening
- Network Vulnerability Management
Answer(s): A
Explanation:
Reference:
https://csf.tools/reference/cloud-controls-matrix/version-3-0-1/ivs/
Reveal Solution Next Question