Home
Browse frameworks
Contact us
SAMMY premium
Login
SAMMY UI is optimized for resolutions with a width 1024px and higher.
Cybersecurity Fundamentals
Browse Cybersecurity...
SAMM
OpenSAMM1.5
ISO 27001 (Deprecated)
Cybersecurity Fundamentals
NIST CSF 2.0
NIST SSDF
NIST 800-34
DSOMM
BSIMM 14
IDENTIFY
Asset Management
Business Environment
Governance
Risk Assessment
Risk Management Strategy
Supply Chain Risk Management
PROTECT
Identity Management, Authentication and Access Control
Awareness and Training
Data Security
Information Protection Processes and Procedures
Maintenance
Protective Technology
DETECT
Anomalies and Events
Security Continuous Monitoring
Detection Processes
RESPOND
Response Planning
Response Communications
Analysis
Mitigation
Response Improvements
RECOVER
Recovery Communications
Recovery Planning
Recovery Improvements
DE.DP-2: Detection activities comply with all applicable requirements
DE.DP-3: Detection processes are tested
DE.DP-4: Event detection information is communicated
DE.DP-5: Detection processes are continuously improved
DE.DP-3.1
DE.DP-3.1: The organization shall validate that event detection processes are operating as intended.
Validation includes testing.
Validation should be demonstrable.
Not applicable
Level 1 - Initial
Level 2 - Repeatable
Level 3 - Defined
Level 4 - Managed
Level 5 - Optimizing
Not applicable
Level 1 - Initial
Level 2 - Repeatable
Level 3 - Defined
Level 4 - Managed
Level 5 - Optimizing
Description
The organization shall validate that event detection processes are operating as intended.