Detect Function
Specification Documents
Unit Information Security Plan Specification – DETECT (Authentication Required)
Additional Guidance
DE.CM-5
Mobile code includes any program, application, or content that can be transmitted across a network (e.g. embedded in an email, document, or website) and executed on a remote system. Mobile code technology examples include Java applets, JavaScript, HTML5, WebGL, VBScript, etc.
DE.DP-2
To establish an inventory for third-party reporting requirements, units should begin with a review of any contracts, grants, agreements, or applicable regulations to understand the specific reporting requirements. The inventory can simply contain the third-party reference and the specific reporting requirements such as who to contact and within what timeframe.