Security Continuous Monitoring (CM)

External service provider activity is monitored to detect potential cybersecurity events


Login

Security Continuous Monitoring (CM)

Monitoring for unauthorized personnel, connections, devices, and software is performed


Login

Security Continuous Monitoring (CM)

Vulnerability scans are performed


Login

Detection Processes (DP)

Roles and responsibilities for detection are well defined to ensure accountability


Login

Detection Processes (DP)

Detection activities comply with all applicable requirements


Login

Detection Processes (DP)

Detection processes are tested


Login

Detection Processes (DP)

Event detection information is communicated


Login

Detection Processes (DP)

Detection processes are continuously improved


Login

Asset Management (AM)

Physical devices and systems within the organization are inventoried


Login

Asset Management (AM)

Software platforms and applications within the organization are inventoried


Login