// Level 4 · Control detail
SC-26MediumNIST 800-53 · System and Communications Protection

Decoys

Include components within organizational systems specifically designed to be the target of malicious attacks for detecting, deflecting, and analyzing such attacks.

Get AI-powered control detail

Plain-English explanation, CLI checks, portal steps, remediation, automation snippets, and cross-framework mappings.

3/3 free lookups remaining today

Related controls in other frameworks

finding related controls…