💼 DE.CM-5: Unauthorized mobile code is detected
- Contextual name: 💼 DE.CM-5: Unauthorized mobile code is detected
- ID:
/frameworks/nist-csf-v1.1/de-cm/05
- Located in: 💼 Security Continuous Monitoring (DE.CM)
Description
Empty...
Similar
- Sections
/frameworks/iso-iec-27001-2013/12/05/01
/frameworks/iso-iec-27001-2013/12/06/02
/frameworks/nist-sp-800-53-r4/sc/18
/frameworks/nist-sp-800-53-r4/si/04
/frameworks/nist-sp-800-53-r4/sc/44
- Internal
- ID:
dec-c-890694db
- ID:
Similar Sections (Take Policies From)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 ISO/IEC 27001:2013 → 💼 A.12.5.1 Installation of software on operational systems | 5 | 5 | ||
💼 ISO/IEC 27001:2013 → 💼 A.12.6.2 Restrictions on software installation | ||||
💼 NIST SP 800-53 Revision 4 → 💼 SC-18 MOBILE CODE | 5 | |||
💼 NIST SP 800-53 Revision 4 → 💼 SC-44 DETONATION CHAMBERS | ||||
💼 NIST SP 800-53 Revision 4 → 💼 SI-4 INFORMATION SYSTEM MONITORING | 24 |
Similar Sections (Give Policies To)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 NIST CSF v2.0 → 💼 DE.CM-01: Networks and network services are monitored to find potentially adverse events | 118 | |||
💼 NIST CSF v2.0 → 💼 DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events | 137 |
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (11)
Internal Rules
Rule | Policies | Flags |
---|---|---|
✉️ dec-x-0d66ed99 | 1 | |
✉️ dec-x-36ced3d1 | 1 | |
✉️ dec-x-89d5ed7a | 1 | |
✉️ dec-x-611eaa35 | 1 | |
✉️ dec-x-850beea8 | 1 | |
✉️ dec-x-879aa996 | 1 | |
✉️ dec-x-215302da | 1 | |
✉️ dec-x-a20e54a0 | 1 | |
✉️ dec-x-b1e1a494 | 1 | |
✉️ dec-x-db1b7a1b | 1 | |
✉️ dec-x-f82b9849 | 1 |