Deployment

Controls for identifying, analyzing, and addressing vulnerabilities in products in production/that have been deployed

Practices

D

D.1 Respond to/disclose vulnerabilities

Controls for identifying and addressing vulnerabilities in products and preventing similar ones from occuring in the future.

D.2 Monitor intrusions/violations

Controls for identifying malicious activity at runtime.