💼 SC-26 Decoys
- Contextual name: 💼 SC-26 Decoys
- ID:
/frameworks/nist-sp-800-53-r5/sc/26
- Located in: 💼 SC System And Communications Protection
Description​
Include components within organizational systems specifically designed to be the target of malicious attacks for detecting, deflecting, and analyzing such attacks.
Similar​
- Internal
- ID:
dec-c-2ba5ac33
- ID:
Sub Sections​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 SC-26(1) Decoys _ Detection of Malicious Code |