Boundary Protection | SC-7
Description
- Users working from remote locations are exempt from this.
- Information resources should employ controls such as firewalls to control inbound and outbound traffic where feasible.
Last updated: 3/13/2024
Contact Hours
Questions?