Make provisions so that [encrypted communications traffic to be made visible to system monitoring tools and mechanisms is defined;] is visible to [system monitoring tools and mechanisms to be provided access to encrypted communications traffic are defined;].
Supplemental
Organizations balance the need to encrypt communications traffic to protect data confidentiality with the need to maintain visibility into such traffic from a monitoring perspective. Organizations determine whether the visibility requirement applies to internal encrypted traffic, encrypted traffic intended for external destinations, or a subset of the traffic types.