Mechanisms exist to mitigate the risk associated with the use of insecure ports, protocols and services necessary to operate technology solutions.
Does the organization mitigate the risk associated with the use of insecure ports, protocols and services necessary to operate technology solutions?