💼 NIST CSF v1.1 → 💼 DE.DP-5: Detection processes are continuously improved | | 13 | 15 | |
💼 NIST CSF v1.1 → 💼 PR.IP-7: Protection processes are improved | | | 2 | |
💼 NIST CSF v1.1 → 💼 PR.IP-8: Effectiveness of protection technologies is shared | | 6 | 6 | |
💼 NIST CSF v1.1 → 💼 RC.IM-1: Recovery plans incorporate lessons learned | | | | |
💼 NIST CSF v1.1 → 💼 RC.IM-2: Recovery strategies are updated | | | | |
💼 NIST CSF v1.1 → 💼 RS.IM-1: Response plans incorporate lessons learned | | | | |
💼 NIST CSF v1.1 → 💼 RS.IM-2: Response strategies are updated | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 AC-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 AT-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 AU-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 CA-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 CA-2 Control Assessments | 3 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 CA-5 Plan of Action and Milestones | 1 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 CA-7 Continuous Monitoring | 6 | | 10 | |
💼 NIST SP 800-53 Revision 5 → 💼 CA-8 Penetration Testing | 3 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 CM-1 Policy and Procedures | | | 3 | |
💼 NIST SP 800-53 Revision 5 → 💼 CP-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 CP-2 Contingency Plan | 8 | | 2 | |
💼 NIST SP 800-53 Revision 5 → 💼 IA-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 IR-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 IR-4 Incident Handling | 15 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 IR-8 Incident Response Plan | 1 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 MA-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 MP-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 PE-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 PL-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 PL-2 System Security and Privacy Plans | 3 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 PM-1 Information Security Program Plan | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 PM-4 Plan of Action and Milestones Process | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 PM-31 Continuous Monitoring Strategy | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 PS-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 PT-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 RA-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 RA-3 Risk Assessment | 4 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 RA-5 Vulnerability Monitoring and Scanning | 11 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 RA-7 Risk Response | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 SA-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 SA-4 Acquisition Process | 12 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 SA-8 Security and Privacy Engineering Principles | 33 | | 7 | |
💼 NIST SP 800-53 Revision 5 → 💼 SA-11 Developer Testing and Evaluation | 9 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 SC-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 SI-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 SI-2 Flaw Remediation | 6 | 6 | 7 | |
💼 NIST SP 800-53 Revision 5 → 💼 SI-4 System Monitoring | 25 | 1 | 8 | |
💼 NIST SP 800-53 Revision 5 → 💼 SR-1 Policy and Procedures | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 SR-5 Acquisition Strategies, Tools, and Methods | 2 | | | |