💼 SC-26 Decoys
- ID:
/frameworks/nist-sp-800-53-r5/sc/26
Description​
Include components within organizational systems specifically designed to be the target of malicious attacks for detecting, deflecting, and analyzing such attacks.
Similar​
- Internal
- ID:
dec-c-2ba5ac33
- ID:
Sub Sections​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 SC-26(1) Decoys _ Detection of Malicious Code | no data |