2 templates mapped to DORA (Article 10).
Policy for implementing and operating intrusion detection and prevention systems (IDS/IPS) to detect and block malicious network activity.
Comprehensive policy for establishing and operating a proactive threat hunting program to identify advanced threats that evade automated detection systems.