CCI-001195
CCI-001195 Definition
| Status | |
| Type | CheckType.policy |
Master Assessment Datasheet
Implementation Guidance
Determine if: - components within organizational systems specifically designed to be the target of malicious attacks are included to detect such attacks. - components within organizational systems specifically designed to be the target of malicious attacks are included to deflect such attacks. - components within organizational systems specifically designed to be the target of malicious attacks are included to analyze such attacks
Validation Procedures
Examine: [SELECT FROM: System and communications protection policy; procedures addressing the use of decoys; system design documentation; system configuration settings and associated documentation; system audit records; system security plan; other relevant documents or records]. Interview: [SELECT FROM: System/network administrators; organizational personnel with information security responsibilities; system developer]. Test: [SELECT FROM: Mechanisms supporting and/or implementing decoys].