Detect Function

Specification Documents

Unit Information Security Plan Specification – DETECT (Authentication Required)

Additional Guidance

DE.CM-5

Mobile code includes any program, application, or content that can be transmitted across a network (e.g. embedded in an email, document, or website) and executed on a remote system.  Mobile code technology examples include Java applets, JavaScript, HTML5, WebGL, VBScript, etc. 

DE.DP-2

To establish an inventory for third-party reporting requirements, units should begin with a review of any contracts, grants, agreements, or applicable regulations to understand the specific reporting requirements.  The inventory can simply contain the third-party reference and the specific reporting requirements such as who to contact and within what timeframe.