5.3.5.1 DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed.5.3.5 Security Continuous Monitoring (DE.CM).5.3.4.2 PR.DS-8: Integrity-checking mechanisms are used to verify hardware integrity.5.3.4.1 PR.DS-6: Integrity-checking mechanisms are used to verify software, firmware, and information integrity.5.3.3.1 PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions.5.3.3 Identity Management, Authentication and Access Control (PR.AC).5.3.2.1 ID.AM-1: Physical devices and systems within the organization are inventoried.5.3.1.1 ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations, to confirm they are meeting their contractual obligations.5.3.1 Supply Chain Risk Management (ID.SC).4.3.3 Platform Manifest Correlation System.4.3.1 Host Integrity at Runtime and Start-up Attestation Certificate Authority (HIRS ACA).4.3 Supporting Platform Integrity Validation Systems.4.2.4.1 Archer Integrated Risk Management (IRM) Platform.4.2.3.1 Microsoft Endpoint Configuration Manager. 4.2.2.1 Archer Integrated Risk Management (IRM) Platform.4.2.2 Asset Discovery and Management System.4.2 Existing Enterprise IT Management Systems.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |