IVS-09: Are processes, procedures, and defense-in-depth techniques defined, implemented,
and evaluated for protection, detection, and timely response to network-based
attacks?
Control implemented
Control ownership
Description
Define, implement and evaluate processes, procedures and defense-in-depth
techniques for protection, detection, and timely response to network-based attacks.