NET-18.2 ยท Visibility of Encrypted Communications

Control Description

Mechanisms exist to configure the proxy to make encrypted communications traffic visible to monitoring tools and mechanisms.

Control Question
Assessment question for control validation

Does the organization configure the proxy to make encrypted communications traffic visible to monitoring tools and mechanisms?

Control Weighting
5
Validation Cadence
Annual
NIST CSF Function
Detect
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 2 - Operational
Tier 3 - Tactical
Core Control Designations
Special designations and baseline inclusions
ESP Level 2: NET-18.2
ESP Level 3: NET-18.2