External service provider activity is monitored to detect potential cybersecurity events
External service provider activity is monitored to detect potential cybersecurity events
Monitoring for unauthorized personnel, connections, devices, and software is performed
Vulnerability scans are performed
Roles and responsibilities for detection are well defined to ensure accountability
Detection activities comply with all applicable requirements
Detection processes are tested
Event detection information is communicated
Detection processes are continuously improved
Physical devices and systems within the organization are inventoried
Software platforms and applications within the organization are inventoried