Skip to main content
Applications
Security Posture Management
Continuous Monitoring
Vendor Risk Management
Trust Management Hub
Cyber Insurance
National Cybersecurity
Bitsight API docs
Bitsight Academy
Viewing as guest:
Log In
Sign in
Submit a request
Bitsight Knowledge Base
Bitsight Data
Control Insights Data
Control Insights Data
Insights to Control Framework Mapping
Insights to Control Framework Mapping: Browser Configurations
Insights to Control Framework Mapping: Detected Services
Insights to Control Framework Mapping: Device Management
Insights to Control Framework Mapping: DNS Configurations
Insights to Control Framework Mapping: Email Configurations
Insights to Control Framework Mapping: File Sharing
Insights to Control Framework Mapping: Header Configurations
Insights to Control Framework Mapping: Malware Presence
Insights to Control Framework Mapping: Mobile Applications
Insights to Control Framework Mapping: Network Attack Surface
Insights to Control Framework Mapping: Potentially Unwanted Application & Software Presence
Insights to Control Framework Mapping: Software Configuration
Insights to Control Framework Mapping: Software Support
Insights to Control Framework Mapping: TLS/SSL Certificate Configurations
Insights to Control Framework Mapping: User Management
Insights to Control Framework Mapping: Vulnerability Management & Security Hygiene