|Description||When a compromise occurs, or new exploits are discovered, Service Providers, Network Operators and Public Safety should perform an audit of available network services to reassess any vulnerability to attack and re-evaluate the business need to provide that service, or explore alternate means of providing the same capability.|
|Network Type(s)||Cable; Internet/Data; Satellite; Wireless; Wireline|
|Industry Role(s)||Service Provider; Network Operator|
|Keyword(s)||Cyber Security;Intrusion Detection;|
|Reference/Comments||Configuration guides for security from NIST, US-CERT, NSA, SANS, vendors, etc.
Related to NRIC BP 8000.