This control requires organizations to configure their systems and network devices using a default-deny approach, only allowing explicitly approved network traffic to enter or exit. Anything not explicitly permitted should be automatically blocked.
Read the full blog breakdown of 3.13.6