
RS.MI-3: Mitigation
Newly identified vulnerabilities are mitigated or documented as accepted risks.



RS.AN-5: Analysis
Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g., internal testing, security bulletins, or security researchers).





RS.CO-5: Communications
Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness.

RS.CO-4: Communications
Coordination with stakeholders occurs consistent with response plans.



RS.CO-1: Communications
Personnel know their roles and order of operations when a response is needed.



DE.DP-4: Detection Processes
Event detection information is communicated to appropriate parties.


DE.DP-2: Detection Processes
Detection activities comply with all applicable requirements.

DE.DP-1: Detection Processes
Roles and responsibilities for detection are well defined to ensure accountability.
