3.1. Preparation |
3.1.14. Use host-based/personal firewall software to limit individual hosts’ exposure |
3.1.14. Use host-based/personal firewall software to limit individual hosts’ exposure to attacks.
Deploying host-based or personal firewall software to individual hosts and configuring it to deny all activity that is not expressly permitted should further reduce the likelihood of unauthorized access incidents.