Analyzing Public Key Infrastructure certificates to detect if they have been misconfigured or spoofed using both network traffic, certificate fields and third-party logs.
| ID | Name | Description | NIST Rev5 | D3FEND | ISO 27001 | |
| ID | Name | Description | |
|---|---|---|---|
| ID | Description | |
| Requirement | Rationale/Additional Guidance/Notes |
|---|