Skip to main content

💼 11.5 Network intrusions and unexpected file changes are detected and responded to.

Description​

Empty...

Similar​

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 11.5.1 Intrusion-detection and/or intrusion-prevention techniques are used to detect and/or prevent intrusions into the network.18
    💼 11.5.1.1 Intrusion-detection and/or intrusion-prevention techniques detect, alert on/prevent, and address covert malware communication channels.8
💼 11.5.2 A change-detection mechanism (for example, file integrity monitoring tools) is deployed.1