ISM-1213—ISM-1213
>Control Description
Following intrusion remediation activities, full network traffic is captured for at least seven days and analysed to determine whether malicious actors have been successfully removed from the system.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.