Skip to main content

💼 SC-26 Decoys

Description​

Include components within organizational systems specifically designed to be the target of malicious attacks for detecting, deflecting, and analyzing such attacks.

Similar​

  • Internal
    • ID: dec-c-2ba5ac33

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 SC-26(1) Decoys _ Detection of Malicious Code