SC-35: External Malicious Code Identification
From NIST's SP800-53:
Include system components that proactively seek to identify network-based malicious code or malicious websites.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.