Anomalies and Events (AE)

A baseline of network operations and expected data flows for users and systems is established and managed


Login

Anomalies and Events (AE)

Detected events are analyzed to understand attack targets and methods


Login

Anomalies and Events (AE)

Event data are collected and correlated from multiple sources and sensors


Login

Anomalies and Events (AE)

Impact of events is determined


Login

Anomalies and Events (AE)

Incident alert thresholds are established


Login

Security Continuous Monitoring (CM)

The network is monitored to detect potential cybersecurity events


Login

Security Continuous Monitoring (CM)

The physical environment is monitored to detect potential cybersecurity events


Login

Security Continuous Monitoring (CM)

Personnel activity is monitored to detect potential cybersecurity events


Login

Security Continuous Monitoring (CM)

Malicious code is detected


Login

Security Continuous Monitoring (CM)

Unauthorized mobile code is detected


Login