Boundary Protection | SC-7

Description

  • Users working from remote locations are exempt from this.
  • Information resources should employ controls such as firewalls to control inbound and outbound traffic where feasible.

Last updated: 3/13/2024

Contact Hours


Questions?