Skip to main content

💼 Security Continuous Monitoring (DE.CM)

  • ID: /frameworks/nist-csf-v1.1/de-cm

Description​

The information system and assets are monitored to identify cybersecurity events and verify the effectiveness of protective measures.

Similar​

  • Internal
    • ID: dec-b-2337b3d5

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 DE.CM-1: The network is monitored to detect potential cybersecurity events1863no data
💼 DE.CM-2: The physical environment is monitored to detect potential cybersecurity eventsno data
💼 DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events2026no data
💼 DE.CM-4: Malicious code is detected77no data
💼 DE.CM-5: Unauthorized mobile code is detected1112no data
💼 DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events67no data
💼 DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed1824no data
💼 DE.CM-8: Vulnerability scans are performed77no data