13.3—13.3
>Control Description
Deploy a network intrusion detection solution on enterprise assets, where appropriate. Example implementations include the use of a Network Intrusion Detection System (NIDS) or equivalent cloud service provider (CSP) service.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.