Endpoint Protection
Deploy and manage endpoint security solutions.
9 of 9 frameworks cover this control
Framework Mappings
How Endpoint Protection maps to each of the 6 cybersecurity frameworks tracked by ControlMap.
| Framework | Status | Control IDs |
|---|---|---|
| NIST CSF 2.0 | Covered | PR.IR-01 |
| ISO 27001 | Covered | A.8.1 A.8.7 |
| CIS v8 | Covered | CIS 10.1 CIS 10.2 |
| SOC 2 | Covered | CC6.8 CC7.1 |
| PCI DSS | Covered | 5.2.1 5.2.2 5.3.1 |
| CMMC | Covered | SI.L2-3.14.2 SI.L2-3.14.4 |
| 800-53 | Covered | SI-3 SI-4 |
| HIPAA | Covered | §164.308(a)(5)(ii)(B) §164.310(d)(1) |
| GDPR | Covered | Art.32(1)(b) |
About Endpoint Protection
Endpoint Protection is a cybersecurity control in the Protect domain. Deploy and manage endpoint security solutions. Endpoint protection involves deploying and managing security agents on workstations, servers, and mobile devices to detect and prevent malware, ransomware, and other threats at the device level. Modern endpoint detection and response (EDR) solutions go beyond traditional antivirus by providing behavioral analysis, threat hunting capabilities, automated response actions, and detailed forensic telemetry. Organizations should ensure endpoint protection covers all operating systems in use, is centrally managed with consistent policies, and integrates with SIEM and SOAR platforms for coordinated detection and response.
This control is recognized by 9 of the 6 major frameworks: NIST CSF 2.0, ISO 27001, CIS v8, SOC 2, PCI DSS, CMMC, 800-53, HIPAA, GDPR. It has full coverage across all ${FW_KEYS.length} frameworks.