πΌ NIST SP 800-53 Revision 5 β πΌ AC-2(12) Account Management _ Account Monitoring for Atypical Usage | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ AU-6(1) Audit Record Review, Analysis, and Reporting _ Automated Process Integration | | 1 | 1 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AU-6(5) Audit Record Review, Analysis, and Reporting _ Integrated Analysis of Audit Records | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ CA-7 Continuous Monitoring | 6 | | 8 | |
πΌ NIST SP 800-53 Revision 5 β πΌ CM-8(3) System Component Inventory _ Automated Unauthorized Component Detection | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ RA-3(4) Risk Assessment _ Predictive Cyber Analytics | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-8(19) Security and Privacy Engineering Principles _ Continuous Protection | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-8(21) Security and Privacy Engineering Principles _ Self-analysis | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-8(25) Security and Privacy Engineering Principles _ Economic Security | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-11(1) Developer Testing and Evaluation _ Static Code Analysis | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-11(6) Developer Testing and Evaluation _ Attack Surface Reviews | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-15(2) Development Process, Standards, and Tools _ Security and Privacy Tracking Tools | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-15(8) Development Process, Standards, and Tools _ Reuse of Threat and Vulnerability Information | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-5 Denial-of-service Protection | 3 | | 2 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-5(1) Denial-of-service Protection _ Restrict Ability to Attack Other Systems | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-5(3) Denial-of-service Protection _ Detection and Monitoring | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-3(8) Malicious Code Protection _ Detect Unauthorized Commands | | | 3 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-4 System Monitoring | 25 | 1 | 5 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-4(1) System Monitoring _ System-wide Intrusion Detection System | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-4(2) System Monitoring _ Automated Tools and Mechanisms for Real-time Analysis | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-4(4) System Monitoring _ Inbound and Outbound Communications Traffic | | 1 | 1 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-4(5) System Monitoring _ System-generated Alerts | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-4(13) System Monitoring _ Analyze Traffic and Event Patterns | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-4(22) System Monitoring _ Unauthorized Network Services | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-4(25) System Monitoring _ Optimize Network Traffic Analysis | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-20 Tainting | | | | |
πΌ PCI DSS v3.2.1 β πΌ 11.4 Use intrusion-detection and/or intrusion-prevention techniques to detect and/or prevent intrusions into the network. | | 1 | 1 | |
πΌ PCI DSS v3.2.1 β πΌ 11.5.1 Implement a process to respond to any alerts generated by the change detection solution. | | | | |