Continuous Monitoring

Level N/A

Mechanisms exist to ensure databases produce audit records that contain sufficient information to monitor database activities.


Login

Continuous Monitoring

Mechanisms exist to allocate and proactively manage sufficient event log storage capacity to reduce the likelihood of such capacity being exceeded.


Login

Continuous Monitoring

Mechanisms exist to alert appropriate personnel in the event of a log processing failure and take actions to remedy the disruption.


Login

Continuous Monitoring

Mechanisms exist to provide 24x7x365 near real-time alerting capability when an event log processing failure occurs.


Login

Continuous Monitoring

Automated mechanisms exist to alert appropriate personnel when the allocated volume reaches an organization-defined percentage of maximum event log storage capacity.


Login

Continuous Monitoring

Mechanisms exist to provide an event log report generation capability to aid in detecting and assessing anomalous activities.


Login

Continuous Monitoring

Mechanisms exist to provide and implement the capability for auditing the parameters of user query events for data sets containing Personal Data (PD).


Login

Continuous Monitoring

Mechanisms exist to employ trend analyses to determine if security control implementations, the frequency of continuous monitoring activities, and/or the types of activities used in the continuous monitoring process need to be modified based on empirical data.


Login

Continuous Monitoring

Level N/A

Mechanisms exist to configure systems to use an authoritative time source to generate time stamps for event logs.


Login

Continuous Monitoring

Mechanisms exist to synchronize internal system clocks with an authoritative time source.


Login