Make provisions so that encrypted communications traffic is visible to system monitoring tools and mechanisms.
Organizations balance the need to encrypt communications traffic to protect data confidentiality with the need to maintain visibility into such traffic from a monitoring perspective. Organizations determine whether the visibility requirement applies to internal encrypted traffic, encrypted traffic intended for external destinations, or a subset of the traffic types.
provisions are made so that encrypted communications traffic is visible to system monitoring tools and mechanisms.
No cross-framework mappings available