Skip to main content

💼 SC-35 External Malicious Code Identification

Description​

Include system components that proactively seek to identify network-based malicious code or malicious websites.

Similar​

  • Internal
    • ID: dec-c-71834820

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
💼 NIST CSF v2.0 → 💼 DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events137

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags