Mechanisms exist to monitor and control communications at the external network boundary and at key internal boundaries within the network.
Does the organization monitor and control communications at the external network boundary and at key internal boundaries within the network?