Skip to main content
Bitsight Knowledge Base Help Center home page
Security Posture Management
Continuous Monitoring
Vendor Risk Management
Trust Management Hub
Cyber Insurance
National Cybersecurity
    Bitsight API docs Bitsight Academy
    • Sign in
    • Submit a request
  1. Bitsight Knowledge Base
  2. Bitsight Data
  3. Control Insights Data

Control Insights Data

  • Insights to Control Framework Mapping
  • Insights to Control Framework Mapping: Browser Configurations
  • Insights to Control Framework Mapping: Detected Services
  • Insights to Control Framework Mapping: Device Management
  • Insights to Control Framework Mapping: DNS Configurations
  • Insights to Control Framework Mapping: Email Configurations
  • Insights to Control Framework Mapping: File Sharing
  • Insights to Control Framework Mapping: Header Configurations
  • Insights to Control Framework Mapping: Malware Presence
  • Insights to Control Framework Mapping: Mobile Applications
  • Insights to Control Framework Mapping: Network Attack Surface
  • Insights to Control Framework Mapping: Potentially Unwanted Application & Software Presence
  • Insights to Control Framework Mapping: Software Configuration
  • Insights to Control Framework Mapping: Software Support
  • Insights to Control Framework Mapping: TLS/SSL Certificate Configurations
  • Insights to Control Framework Mapping: User Management
  • Insights to Control Framework Mapping: Vulnerability Management & Security Hygiene

Contents © 2025 BitSight Technologies, Inc. ("Bitsight")

Privacy Policy | Disclaimer | Terms and Conditions | Contact Bitsight | Bitsight Academy | Bitsight Support