Focuses on the establishment of policy to detect changes from a known baseline or trusted state by utilizing NNT’s best practices and library of policies. These policies are derived from trusted third-parties like the Center for Internet Security (CIS) top 20 controls that prioritize a set of actions that mitigate an organizations risk from known cyber-attack vectors.
Focuses on creating a closed-loop environment specific to “expected” changes. Any identified changes that are not planned or map to an authorized work order are suspect to investigation and/or remediation.
The by-product of leveraging these two approaches together is that you are able to deliver continuous compliance & assurance on a daily basis…whatever the standard, regulation or policy.