Mechanisms exist to implement enhanced activity monitoring for individuals who have been identified as posing an increased level of risk.
Mechanisms exist to implement enhanced activity monitoring for individuals who have been identified as posing an increased level of risk.
Mechanisms exist to implement enhanced activity monitoring for privileged users.
Mechanisms exist to assess the organization's needs for monitoring and prioritize the monitoring of assets, based on asset criticality and the sensitivity of the data it stores, transmits and processes.
Mechanisms exist to enable authorized personnel the ability to remotely view and hear content related to an established user session in real time, in accordance with organizational standards, as well as statutory, regulatory and contractual obligations.
Mechanisms exist to utilize a Security Incident Event Manager (SIEM) or similar automated tool, to support the centralized collection of security-related event logs.
Automated mechanisms exist to correlate both technical and non-technical information from across the enterprise by a Security Incident Event Manager (SIEM) or similar automated tool, to enhance organization-wide situational awareness.
Automated mechanisms exist to centrally collect, review and analyze audit records from multiple sources.
Automated mechanisms exist to integrate the analysis of audit records with analysis of vulnerability scanners, network performance, system monitoring and other sources to further enhance the ability to identify inappropriate or unusual activity.
Automated mechanisms exist to correlate information from audit records with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual or malevolent activity.
Mechanisms exist to specify the permitted actions for both users and systems associated with the review, analysis and reporting of audit information.