"Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls." Which of the following types of controls BEST matches this control description?
Correct Answer: B
The correct answer is B. Network security is the type of control that best matches the control description given in the question. Network security involves designing and configuring network environments and virtual instances to restrict and monitor traffic between trusted and untrusted connections, such as firewalls, routers, switches, VPNs, and network segmentation. Network security also requires periodic reviews and documentation of the network configurations and the justification for the allowed services, protocols, ports, and compensating controls.
The other options are not directly related to the question. Option A, virtual instance and OS hardening, refers to the process of applying security configurations and patches to virtual instances and operating systems to reduce their attack surface and vulnerabilities. Option C, network vulnerability management, refers to the process of identifying, assessing, prioritizing, and remediating network vulnerabilities using tools such as scanners, analyzers, and testers. Option D, change detection, refers to the process of monitoring and detecting changes in the system or network environment that could affect the security posture or performance of the system or network.
References :=
* IVS-01: Network Security - CSF Tools - Identity Digital1
* Certificate of Cloud Auditing Knowledge (CCAK) Study Guide, Chapter 6: Cloud Security Controls
* Cloud Controls Matrix (CCM) - CSA2