1.8 Components are segregatedΒΆ

Verify that components are segregated from each other via a defined security control, such as network segmentation, firewall rules, or cloud based security groups.

Levels: 2, 3