πΌ NIST SP 800-53 Revision 5 β πΌ AC-2(12) Account Management _ Account Monitoring for Atypical Usage | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ AU-6(1) Audit Record Review, Analysis, and Reporting _ Automated Process Integration | | 1 | 1 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AU-6(5) Audit Record Review, Analysis, and Reporting _ Integrated Analysis of Audit Records | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ CA-7 Continuous Monitoring | 6 | | 8 | |
πΌ NIST SP 800-53 Revision 5 β πΌ CM-8(3) System Component Inventory _ Automated Unauthorized Component Detection | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ RA-3(4) Risk Assessment _ Predictive Cyber Analytics | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-8(19) Security and Privacy Engineering Principles _ Continuous Protection | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-8(21) Security and Privacy Engineering Principles _ Self-analysis | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-8(25) Security and Privacy Engineering Principles _ Economic Security | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-11(1) Developer Testing and Evaluation _ Static Code Analysis | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-11(6) Developer Testing and Evaluation _ Attack Surface Reviews | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-15(2) Development Process, Standards, and Tools _ Security and Privacy Tracking Tools | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-15(8) Development Process, Standards, and Tools _ Reuse of Threat and Vulnerability Information | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-5 Denial-of-service Protection | 3 | | 2 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-5(1) Denial-of-service Protection _ Restrict Ability to Attack Other Systems | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-5(3) Denial-of-service Protection _ Detection and Monitoring | | | | |
|