MS-2.7-004—Identify metrics that reflect the effectiveness of security measures, such as data provenance, the
>Control Description
Identify metrics that reflect the effectiveness of security measures, such as data provenance, the number of unauthorized access attempts, inference, bypass, extraction, penetrations, or provenance verification.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.