Overview
While network security controls (NSCs) are discussed in Requirement 1, those NSCs and the rest of the systems and devices are covered in Requirement 2.
The entire point of this requirements section is to ensure that organizations are correctly configuring all their devices to ensure their security so that attackers cannot easily compromise ...