The organization identifies connections to external information systems (i.e., information systems outside of the authorization boundary).
No STIG checks reference this CCI.