2.3.5—2.3.5
>Control Description
DoD Components continue the deployment of Application Control to all environments and in prevention mode. File Integrity Monitoring (FIM) and Application Controls analytics are integrated into Comply to Connect (C2C) for expanded access decision making. C2C analytics are evaluated for further device/endpoint security stack data points such as UEDM and are integrated as necessary.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.