Score of Applied Controls:
20
20 out of 494
Count of Applied Controls:
331
331 out of 494
Risk Assessment
[based on applied Controls]
33
33 out of 100
494 Cntrls
Access and Data Management Access and Data Management
0 / 38 Answered
Anomalous Activity Detection Anomalous Activity Detection
0 / 22 Answered
Audit Audit
0 / 18 Answered
Connections Connections
0 / 16 Answered
Contracts Contracts
0 / 13 Answered
Culture Culture
0 / 9 Answered
Detection Detection
0 / 12 Answered
Device / End-Point Security Device / End-Point Security
0 / 14 Answered
Due Diligence Due Diligence
0 / 11 Answered
Escalation and Reporting Escalation and Reporting
0 / 13 Answered
Event Detection Event Detection
0 / 15 Answered
Information Sharing Information Sharing
0 / 15 Answered
Infrastructure Management Infrastructure Management
0 / 31 Answered
IT Asset Management IT Asset Management
0 / 16 Answered
Monitoring and Analyzing Monitoring and Analyzing
0 / 18 Answered
Ongoing Monitoring Ongoing Monitoring
0 / 11 Answered
Oversight Oversight
0 / 25 Answered
Patch Management Patch Management
0 / 13 Answered
Planning Planning
0 / 20 Answered
Remediation Remediation
0 / 11 Answered
Response and Mitigation Response and Mitigation
0 / 18 Answered
Risk Assessment Risk Assessment
0 / 11 Answered
Risk Management Program Risk Management Program
0 / 16 Answered
Secure Coding Secure Coding
0 / 13 Answered
Staffing Staffing
0 / 10 Answered
Strategy / Policies Strategy / Policies
0 / 21 Answered
Testing Testing
0 / 20 Answered
Threat and Vulnerability Detection Threat and Vulnerability Detection
0 / 17 Answered
Threat Intelligence and Information Threat Intelligence and Information
0 / 12 Answered
Training Training
0 / 15 Answered