Manage “What is on the network?”: Identifies the existence of hardware, software, configuration characteristics and known security vulnerabilities.
Manage “Who is on the network?”: Identifies and determines the users or systems with access authorization, authenticated permissions and granted resource rights.
Manage “How is the network protected?”: Determines the user/system actions and behavior at the network boundaries and within the computing infrastructure.
Manage “What is happening on the network?”: Prepares for events/incidents, gathers data from appropriate sources; and identifies incidents through analysis of data.
Emerging Tools and Technology: Includes CDM cybersecurity tools and technology not in any other subcategory.