πΌ DE.CM-2: The physical environment is monitored to detect potential cybersecurity events
- Contextual name: πΌ DE.CM-2: The physical environment is monitored to detect potential cybersecurity events
- ID:
/frameworks/nist-csf-v1.1/de-cm/02
- Located in: πΌ Security Continuous Monitoring (DE.CM)
Descriptionβ
Empty...
Similarβ
- Sections
/frameworks/iso-iec-27001-2013/11/01/01
/frameworks/iso-iec-27001-2013/11/01/02
/frameworks/nist-sp-800-53-r4/ca/07
/frameworks/nist-sp-800-53-r4/pe/03
/frameworks/nist-sp-800-53-r4/pe/06
/frameworks/nist-sp-800-53-r4/pe/20
- Internal
- ID:
dec-c-cc903875
- ID:
Similar Sections (Take Policies From)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ ISO/IEC 27001:2013 β πΌ A.11.1.1 Physical security perimeter | ||||
πΌ ISO/IEC 27001:2013 β πΌ A.11.1.2 Physical entry controls | ||||
πΌ NIST SP 800-53 Revision 4 β πΌ CA-7 CONTINUOUS MONITORING | 3 | |||
πΌ NIST SP 800-53 Revision 4 β πΌ PE-3 PHYSICAL ACCESS CONTROL | 6 | |||
πΌ NIST SP 800-53 Revision 4 β πΌ PE-6 MONITORING PHYSICAL ACCESS | 4 | |||
πΌ NIST SP 800-53 Revision 4 β πΌ PE-20 ASSET MONITORING AND TRACKING |
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ NIST CSF v2.0 β πΌ DE.CM-02: The physical environment is monitored to find potentially adverse events | 8 |
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|