3.5.4.1—Threat Monitoring
>Control Description
Maintain a list of relevant threats, threat actor tactics, techniques and procedures and actively monitor systems for those threats.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.