A company’s security team received notice of a critical vulnerability affecting a high-profile device within the web infrastructure. The vendor patch was just made available online but has not yet been regression tested in development environments. In the interim, firewall rules were implemented to reduce the access to the interface affected by the vulnerability. Which of the following controls does this scenario describe?
Imanism
Highly Voted 2 years, 6 months agocomeragh
Highly Voted 2 years, 6 months agoval4
Most Recent 1 year, 7 months agosujon_london
1 year, 8 months agoApplebeesWaiter1122
1 year, 10 months agoseagnull
2 years, 2 months ago