Search


Network Security Services

(Back)

Objective

Establish external and internal network perimeters and monitor network traffic.

Key Considerations

Validation

Applicable Service Models

References

  1. SPIN 2017-01, subsection 6.2.4
  2. Refer to the network security zoning guidance in ITSG-22 and ITSG-38.
  3. CSE Top 10 #1
  4. Related security controls: AC-3, AC‑4, SC-5, SC‑7, SC‑7(5), SI-3, SI-3(7), SI-4