Threats that unauthorized devices can present to DFS ecosystem
Vulnerability: Insecure devices connected to the DFS infrastructure
Control 15.1: MNOs should monitor devices used to connect to or otherwise access the DFS system to ensure that such devices have the latest patches, updated antivirus software, are scanned for rootkits and key loggers, and do not support network extenders.
Last updated 3 years ago