Skip to main content

πŸ’Ό SC-35 External Malicious Code Identification

Description​

Include system components that proactively seek to identify network-based malicious code or malicious websites.

Similar​

  • Internal
    • ID: dec-c-71834820

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events89

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags