These mappings are intended to demonstrate the relationship between existing NIST publications and the Cybersecurity Framework. These preliminary mappings are intended to evolve and progress over time as new publications are created and existing publications are updated. Initially, each publication has been mapped only once to the category considered most applicable. Certain NIST publications that have broad applicability across multiple categories of a function have been included within the General Mappings section
This table provides publications that have broad applicability across multiple categories of a function.
DETECT (DE) |
|
This table consists of NIST Publications that have been mapped only once to an individual Category.
DETECT (DE) |
Anomalies and Events (DE.AE): Anomalous activity is detected in a timely manner and the potential impact of events is understood. |
|
||||||
Security Continuous Monitoring (DE.CM): The information system and assets are monitored at discrete intervals to identify cybersecurity events and verify the effectiveness of protective measures. |
|