314.4(d)(2)—314.4(d)(2)
>Control Description
For information systems, the monitoring and testing shall include continuous monitoring or periodic penetration testing and vulnerability assessments. Absent effective continuous monitoring or other systems to detect, on an ongoing basis, changes in information systems that may create vulnerabilities, you shall conduct:
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.