💼 DE.CM-2: The physical environment is monitored to detect potential cybersecurity events
- Contextual name: 💼 DE.CM-2: The physical environment is monitored to detect potential cybersecurity events
- ID:
/frameworks/nist-csf-v1.1/de-cm/02
- Located in: 💼 Security Continuous Monitoring (DE.CM)
Description​
Empty...
Similar​
- Sections
/frameworks/iso-iec-27001-2013/11/01/01
/frameworks/iso-iec-27001-2013/11/01/02
/frameworks/nist-sp-800-53-r4/ca/07
/frameworks/nist-sp-800-53-r4/pe/03
/frameworks/nist-sp-800-53-r4/pe/06
/frameworks/nist-sp-800-53-r4/pe/20
- Internal
- ID:
dec-c-cc903875
- ID:
Similar Sections (Take Policies From)​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 ISO/IEC 27001:2013 → 💼 A.11.1.1 Physical security perimeter | ||||
💼 ISO/IEC 27001:2013 → 💼 A.11.1.2 Physical entry controls | ||||
💼 NIST SP 800-53 Revision 4 → 💼 CA-7 CONTINUOUS MONITORING | 3 | |||
💼 NIST SP 800-53 Revision 4 → 💼 PE-3 PHYSICAL ACCESS CONTROL | 6 | |||
💼 NIST SP 800-53 Revision 4 → 💼 PE-6 MONITORING PHYSICAL ACCESS | 4 | |||
💼 NIST SP 800-53 Revision 4 → 💼 PE-20 ASSET MONITORING AND TRACKING |
Similar Sections (Give Policies To)​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 NIST CSF v2.0 → 💼 DE.CM-02: The physical environment is monitored to find potentially adverse events | 10 |
Sub Sections​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|