This policy protects security infrastructure and provides protection that can be reached within a company’s configuration control, protecting organizations from external threats.
Risks Addressed by Policy:
- Security vulnerabilities that will lead to exploited compromises of information system security.