graphgrc

SCF - END-06.2 - Integration of Detection & Response

Mechanisms exist to detect and respond to unauthorized configuration changes as cybersecurity incidents.

Mapped framework controls

NIST 800-53

SOC 2

Control questions

Does the organization detect and respond to unauthorized configuration changes as cybersecurity incidents?