This control requires organizations to configure their systems and network devices using a default-deny approach, only allowing explicitly approved network traffic to enter or exit. Anything not explicitly permitted should be automatically blocked.
Read the full blog breakdown of 3.13.6

🍪 We Use Cookies

To enhance your experience and analyze site usage, we use cookies. By continuing to use our site, you agree to our use of cookies in accordance with our Privacy Policy.