Continuous Monitoring

Mechanisms exist to protect event logs and audit tools from unauthorized access, modification and deletion.


Login

Continuous Monitoring

Mechanisms exist to back up event logs onto a physically different system or system component than the Security Incident Event Manager (SIEM) or similar automated tool.


Login

Continuous Monitoring

Mechanisms exist to restrict access to the management of event logs to privileged users with a specific business need.


Login

Continuous Monitoring

Cryptographic mechanisms exist to protect the integrity of event logs and audit tools.


Login

Continuous Monitoring

Automated mechanisms exist to enforce dual authorization for the movement or deletion of event logs.


Login

Continuous Monitoring

Level N/A

Mechanisms exist to utilize a non-repudiation capability to protect against an individual falsely denying having performed a particular action.


Login

Continuous Monitoring

Level N/A

Mechanisms exist to bind the identity of the information producer to the information generated.


Login

Continuous Monitoring

Mechanisms exist to retain event logs for a time period consistent with records retention requirements to provide support for after-the-fact investigations of security incidents and to meet statutory, regulatory and contractual retention requirements.


Login

Continuous Monitoring

Mechanisms exist to monitor for evidence of unauthorized exfiltration or disclosure of non-public information.


Login

Continuous Monitoring

Automated mechanisms exist to analyze network traffic to detect covert data exfiltration.


Login