πΌ NIST CSF v1.1 β πΌ DE.DP-3: Detection processes are tested | | 14 | 14 | |
πΌ NIST CSF v1.1 β πΌ ID.SC-5: Response and recovery planning and testing are conducted with suppliers and third-party providers | | 1 | 1 | |
πΌ NIST CSF v1.1 β πΌ PR.IP-10: Response and recovery plans are tested | | 1 | 1 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AC-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ AT-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ AU-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ CA-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ CA-2 Control Assessments | 3 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ CA-5 Plan of Action and Milestones | 1 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ CA-7 Continuous Monitoring | 6 | | 8 | |
πΌ NIST SP 800-53 Revision 5 β πΌ CA-8 Penetration Testing | 3 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ CM-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ CP-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ CP-2 Contingency Plan | 8 | | 1 | |
πΌ NIST SP 800-53 Revision 5 β πΌ CP-4 Contingency Plan Testing | 5 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ IA-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ IR-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ IR-3 Incident Response Testing | 3 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ IR-4 Incident Handling | 15 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ IR-8 Incident Response Plan | 1 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ MA-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ MP-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ PE-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ PL-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ PL-2 System Security and Privacy Plans | 3 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ PM-1 Information Security Program Plan | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ PS-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ PT-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ RA-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ RA-3 Risk Assessment | 4 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ RA-5 Vulnerability Monitoring and Scanning | 11 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ RA-7 Risk Response | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-8 Security and Privacy Engineering Principles | 33 | | 1 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SA-11 Developer Testing and Evaluation | 9 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-2 Flaw Remediation | 6 | 5 | 6 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SI-4 System Monitoring | 25 | 2 | 6 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SR-1 Policy and Procedures | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ SR-5 Acquisition Strategies, Tools, and Methods | 2 | | | |