💼 DE.CM-2: The physical environment is monitored to detect potential cybersecurity events
- ID:
/frameworks/nist-csf-v1.1/de-cm/02
Description​
Empty...
Similar​
- Sections
/frameworks/iso-iec-27001-2013/11/01/01/frameworks/iso-iec-27001-2013/11/01/02/frameworks/nist-sp-800-53-r4/ca/07/frameworks/nist-sp-800-53-r4/pe/03/frameworks/nist-sp-800-53-r4/pe/06/frameworks/nist-sp-800-53-r4/pe/20
- Internal
- ID:
dec-c-cc903875
- ID:
Similar Sections (Take Policies From)​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 ISO/IEC 27001:2013 → 💼 A.11.1.1 Physical security perimeter | no data | ||||
| 💼 ISO/IEC 27001:2013 → 💼 A.11.1.2 Physical entry controls | no data | ||||
| 💼 NIST SP 800-53 Revision 4 → 💼 CA-7 CONTINUOUS MONITORING | 3 | no data | |||
| 💼 NIST SP 800-53 Revision 4 → 💼 PE-3 PHYSICAL ACCESS CONTROL | 6 | no data | |||
| 💼 NIST SP 800-53 Revision 4 → 💼 PE-6 MONITORING PHYSICAL ACCESS | 4 | no data | |||
| 💼 NIST SP 800-53 Revision 4 → 💼 PE-20 ASSET MONITORING AND TRACKING | no data |
Similar Sections (Give Policies To)​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 NIST CSF v2.0 → 💼 DE.CM-02: The physical environment is monitored to find potentially adverse events | 13 | no data |
Sub Sections​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|