Establish connections to the system on demand and terminate connections after completion of a request; a period of non-use.
Persistent connections to systems can provide advanced adversaries with paths to move laterally through systems and potentially position themselves closer to high value assets. Limiting the availability of such connections impedes the adversary’s ability to move freely through organizational systems.
connections to the system are established on demand; connections to the system are terminated after completion of a request; a period of non-use.
No cross-framework mappings available