Under active development Content is continuously updated and improved

MS-2.7-004Identify metrics that reflect the effectiveness of security measures, such as data provenance, the

>Control Description

Identify metrics that reflect the effectiveness of security measures, such as data provenance, the number of unauthorized access attempts, inference, bypass, extraction, penetrations, or provenance verification.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.