Title
Document Traffic Configuration Rules
Description
All configuration rules that allow traffic to flow through network devices should be documented in a configuration management system with a specific business reason for each rule, a specific individual's name responsible for that business need, and an expected duration of the need.
Reference Item Details
Category: Secure Configuration for Network Devices, such as Firewalls, Routers and Switches