The subdivision of a Category into specific outcomes of technical and/or management activities. Examples of Subcategories include “External information systems are catalogued,” “Data-at-rest is protected,” and “Notifications from detection systems are investigated.”
Source(s):
NISTIR 8183
from
NIST Cybersecurity Framework Version 1.1, NIST Cybersecurity Framework Version 1.0
NISTIR 8183A Vol. 1
from
NIST Cybersecurity Framework Version 1.1
NISTIR 8183A Vol. 2
from
NIST Cybersecurity Framework Version 1.1
NISTIR 8183A Vol. 3
from
NIST Cybersecurity Framework Version 1.1
NISTIR 8183 Rev. 1
from
NIST Cybersecurity Framework Version 1.1
he subdivision of a Category into specific outcomes of technical and/or management activities. Examples of Subcategories include “External information systems are catalogued,” “Data-at-rest is protected,” and “Notifications from detection systems are investigated.”
Source(s):
NIST Cybersecurity Framework Version 1.1
The further divisions of a Category into specific outcomes of technical and/or management activities.
Source(s):
NIST Privacy Framework Version 1.0