What this control requires
The entity implements logical access security measures to protect against threats from sources outside its system boundaries. Includes network security controls, boundary protection, and monitoring for anomalous network activity.