Under active development Content is continuously updated and improved

314.4(d)(2)314.4(d)(2)

>Control Description

For information systems, the monitoring and testing shall include continuous monitoring or periodic penetration testing and vulnerability assessments. Absent effective continuous monitoring or other systems to detect, on an ongoing basis, changes in information systems that may create vulnerabilities, you shall conduct:

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.