Relevant NIST Controls
ADR-0060 · Author: Sybil Melton · Date: 2025-02-07 · Products: platform
Originally
Originally
0012_relevant-nist-controls (v6) · Source on Confluence ↗| Security Function | Control | NIST 800-53 Control | |
|---|---|---|---|
| DETECT PROTECT | DATA MINING PROTECTION | AC-23 | Employ data mining prevention and detection techniques for data storage objects to detect and protect against unauthorized data mining.
|
| AUDIT | CONTINUOUS MONITORING AUTOMATION SUPPORT FOR MONITORING | CA-7(6) | Ensure the accuracy, currency, and availability of monitoring results for the system
|
| AUDIT | SYSTEM COMPONENT INVENTORY | CM-8 |
|
| PLAN | SECURITY AND PRIVACY ARCHITECTURES DEFENSE IN DEPTH SUPPLIER DIVERSITY | PL-8(1) PL-8(2) |
|
| DETECT PROTECT | VULNERABILITY MONITORING AND SCANNING DISCOVERABLE INFORMATION REVIEW HISTORIC AUDIT LOGS CORRELATE SCANNING INFORMATION | RA-5 RA-5(4) RA-5(8) RA-5(10) |
|
| DETECT | THREAT HUNTING | RA-10 |
|
| DETECT PROTECT | MALICIOUS CODE PROTECTION | SI-3 |
|
| DETECT | SYSTEM MONITORING ANALYZE TRAFFIC AND COVERT EXFILTRATION | SI-4(18) | Analyze outbound communications traffic at external interfaces to the system and at the following interior points to detect covert exfiltration of information |
| DETECT PROTECT | SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY RUNTIME APPLICATION SELF-PROTECTION | SI-7(17) | Implement controls for application self-protection at runtime.
|
Last updated on