Our collection modules are constantly scanning your network for anomalies, additions and changes.
Our collection modules are constantly scanning your network for anomalies, additions and changes.
The framework is divided into three parts: “control”, “subcontrol” and “family”. The “family” contains an array of activities, outcomes and references which detail specific aspects of cyber risk control. The “subcontrol” is used to easily add your policies and controls to every digital asset. Risk control standards include iso 27001, cobit, nist sp 800-53, isa 62443, and the council on cybersecurity critical security controls.
Learn More