Skip to main content

💼 SC-26 Decoys

  • ID: /frameworks/nist-sp-800-53-r5/sc/26

Description​

Include components within organizational systems specifically designed to be the target of malicious attacks for detecting, deflecting, and analyzing such attacks.

Similar​

  • Internal
    • ID: dec-c-2ba5ac33

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 SC-26(1) Decoys _ Detection of Malicious Codeno data