3.1.14. Use host-based/personal firewall software to limit individual hosts’ exposure




 

3.1.14. Use host-based/personal firewall software to limit individual hosts’ exposure to attacks.

Deploying host-based or personal firewall software to individual hosts and configuring it to deny all activity that is not expressly permitted should further reduce the likelihood of unauthorized access incidents.