๐ผ RA-1 Policy and Procedures | | | | |
๐ผ RA-2 Security Categorization | 1 | | | |
ย ย ย ย ๐ผ RA-2(1) Security Categorization _ Impact-level Prioritization | | | | |
๐ผ RA-3 Risk Assessment | 4 | | | |
ย ย ย ย ๐ผ RA-3(1) Risk Assessment _ Supply Chain Risk Assessment | | | | |
ย ย ย ย ๐ผ RA-3(2) Risk Assessment _ Use of All-source Intelligence | | | | |
ย ย ย ย ๐ผ RA-3(3) Risk Assessment _ Dynamic Threat Awareness | | | | |
ย ย ย ย ๐ผ RA-3(4) Risk Assessment _ Predictive Cyber Analytics | | | | |
๐ผ RA-4 Risk Assessment Update | | | | |
๐ผ RA-5 Vulnerability Monitoring and Scanning | 11 | | | |
ย ย ย ย ๐ผ RA-5(1) Vulnerability Monitoring and Scanning _ Update Tool Capability | | | | |
ย ย ย ย ๐ผ RA-5(2) Vulnerability Monitoring and Scanning _ Update Vulnerabilities to Be Scanned | | | | |
ย ย ย ย ๐ผ RA-5(3) Vulnerability Monitoring and Scanning _ Breadth and Depth of Coverage | | | | |
ย ย ย ย ๐ผ RA-5(4) Vulnerability Monitoring and Scanning _ Discoverable Information | | | | |
ย ย ย ย ๐ผ RA-5(5) Vulnerability Monitoring and Scanning _ Privileged Access | | | | |
ย ย ย ย ๐ผ RA-5(6) Vulnerability Monitoring and Scanning _ Automated Trend Analyses | | | | |
ย ย ย ย ๐ผ RA-5(7) Vulnerability Monitoring and Scanning _ Automated Detection and Notification of Unauthorized Components | | | | |
ย ย ย ย ๐ผ RA-5(8) Vulnerability Monitoring and Scanning _ Review Historic Audit Logs | | | | |
ย ย ย ย ๐ผ RA-5(9) Vulnerability Monitoring and Scanning _ Penetration Testing and Analyses | | | | |
ย ย ย ย ๐ผ RA-5(10) Vulnerability Monitoring and Scanning _ Correlate Scanning Information | | | | |
ย ย ย ย ๐ผ RA-5(11) Vulnerability Monitoring and Scanning _ Public Disclosure Program | | | | |
๐ผ RA-6 Technical Surveillance Countermeasures Survey | | | | |
๐ผ RA-7 Risk Response | | | | |
๐ผ RA-8 Privacy Impact Assessments | | | | |
๐ผ RA-9 Criticality Analysis | | | | |
๐ผ RA-10 Threat Hunting | | | | |