| 💼 RA-1 Policy and Procedures |  |  |  |  | no data | 
| 💼 RA-2 Security Categorization | 1 |  |  |  | no data | 
|  💼 RA-2(1) Security Categorization _ Impact-level Prioritization |  |  |  |  | no data | 
| 💼 RA-3 Risk Assessment | 4 |  | 1 |  | no data | 
|  💼 RA-3(1) Risk Assessment _ Supply Chain Risk Assessment |  |  |  |  | no data | 
|  💼 RA-3(2) Risk Assessment _ Use of All-source Intelligence |  |  |  |  | no data | 
|  💼 RA-3(3) Risk Assessment _ Dynamic Threat Awareness |  |  |  |  | no data | 
|  💼 RA-3(4) Risk Assessment _ Predictive Cyber Analytics |  |  | 1 |  | no data | 
| 💼 RA-4 Risk Assessment Update |  |  |  |  | no data | 
| 💼 RA-5 Vulnerability Monitoring and Scanning | 11 |  | 1 |  | no data | 
|  💼 RA-5(1) Vulnerability Monitoring and Scanning _ Update Tool Capability |  |  |  |  | no data | 
|  💼 RA-5(2) Vulnerability Monitoring and Scanning _ Update Vulnerabilities to Be Scanned |  |  |  |  | no data | 
|  💼 RA-5(3) Vulnerability Monitoring and Scanning _ Breadth and Depth of Coverage |  |  |  |  | no data | 
|  💼 RA-5(4) Vulnerability Monitoring and Scanning _ Discoverable Information |  |  |  |  | no data | 
|  💼 RA-5(5) Vulnerability Monitoring and Scanning _ Privileged Access |  |  |  |  | no data | 
|  💼 RA-5(6) Vulnerability Monitoring and Scanning _ Automated Trend Analyses |  |  |  |  | no data | 
|  💼 RA-5(7) Vulnerability Monitoring and Scanning _ Automated Detection and Notification of Unauthorized Components |  |  |  |  | no data | 
|  💼 RA-5(8) Vulnerability Monitoring and Scanning _ Review Historic Audit Logs |  |  |  |  | no data | 
|  💼 RA-5(9) Vulnerability Monitoring and Scanning _ Penetration Testing and Analyses |  |  |  |  | no data | 
|  💼 RA-5(10) Vulnerability Monitoring and Scanning _ Correlate Scanning Information |  |  |  |  | no data | 
|  💼 RA-5(11) Vulnerability Monitoring and Scanning _ Public Disclosure Program |  |  |  |  | no data | 
| 💼 RA-6 Technical Surveillance Countermeasures Survey |  |  |  |  | no data | 
| 💼 RA-7 Risk Response |  |  |  |  | no data | 
| 💼 RA-8 Privacy Impact Assessments |  |  |  |  | no data | 
| 💼 RA-9 Criticality Analysis |  |  |  |  | no data | 
| 💼 RA-10 Threat Hunting |  |  |  |  | no data |