Requirements included in the framework

DE
NIST CSF

DETECT

DE.AE
NIST CSF

Anomalies and Events

DE.AE-1
NIST CSF

Baseline of network operations

DE.AE-2
NIST CSF

Analyze detected events

DE.AE-3
NIST CSF

Event data

DE.AE-4
NIST CSF

Impact of events

DE.AE-5
NIST CSF

Incident alert thresholds

DE.CM
NIST CSF

Security Continuous Monitoring

DE.CM-1
NIST CSF

The network monitoring

DE.CM-2
NIST CSF

The physical environment monitoring

DE.CM-3
NIST CSF

Personnel activity

DE.CM-4
NIST CSF

Malicious code detection

DE.CM-5
NIST CSF

Unauthorized mobile code detection

DE.CM-6
NIST CSF

External service provider activity monitoring

DE.CM-7
NIST CSF

Monitoring for unauthorized activity

DE.CM-8
NIST CSF

Vulnerability scans

DE.DP
NIST CSF

Detection Processes

DE.DP-1
NIST CSF

Roles and responsibilities

DE.DP-2
NIST CSF

Detection activities

DE.DP-3
NIST CSF

Detection processes testing

DE.DP-4
NIST CSF

Event detection

DE.DP-5
NIST CSF

Detection processes improvment

ID
NIST CSF

Identify

ID.AM
NIST CSF

Asset Management