Skip to main content

💼 DE.CM-2: The physical environment is monitored to detect potential cybersecurity events

  • ID: /frameworks/nist-csf-v1.1/de-cm/02

Description​

Empty...

Similar​

  • Sections
    • /frameworks/iso-iec-27001-2013/11/01/01
    • /frameworks/iso-iec-27001-2013/11/01/02
    • /frameworks/nist-sp-800-53-r4/ca/07
    • /frameworks/nist-sp-800-53-r4/pe/03
    • /frameworks/nist-sp-800-53-r4/pe/06
    • /frameworks/nist-sp-800-53-r4/pe/20
  • Internal
    • ID: dec-c-cc903875

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 ISO/IEC 27001:2013 → 💼 A.11.1.1 Physical security perimeterno data
💼 ISO/IEC 27001:2013 → 💼 A.11.1.2 Physical entry controlsno data
💼 NIST SP 800-53 Revision 4 → 💼 CA-7 CONTINUOUS MONITORING3no data
💼 NIST SP 800-53 Revision 4 → 💼 PE-3 PHYSICAL ACCESS CONTROL6no data
💼 NIST SP 800-53 Revision 4 → 💼 PE-6 MONITORING PHYSICAL ACCESS4no data
💼 NIST SP 800-53 Revision 4 → 💼 PE-20 ASSET MONITORING AND TRACKINGno data

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 NIST CSF v2.0 → 💼 DE.CM-02: The physical environment is monitored to find potentially adverse events13no data

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance