Deployment
Controls for identifying, analyzing, and addressing vulnerabilities in products in production/that have been deployed
Practices
D
D.1 Respond to/disclose vulnerabilities
Controls for identifying and addressing vulnerabilities in products and preventing similar ones from occuring in the future.
D.2 Monitor intrusions/violations
Controls for identifying malicious activity at runtime.