Continuous Monitoring

Mechanisms exist to implement enhanced activity monitoring for individuals who have been identified as posing an increased level of risk.


Login

Continuous Monitoring

Mechanisms exist to implement enhanced activity monitoring for privileged users.


Login

Continuous Monitoring

Mechanisms exist to assess the organization's needs for monitoring and prioritize the monitoring of assets, based on asset criticality and the sensitivity of the data it stores, transmits and processes.


Login

Continuous Monitoring

Mechanisms exist to enable authorized personnel the ability to remotely view and hear content related to an established user session in real time, in accordance with organizational standards, as well as statutory, regulatory and contractual obligations.


Login

Continuous Monitoring

Mechanisms exist to utilize a Security Incident Event Manager (SIEM) or similar automated tool, to support the centralized collection of security-related event logs.


Login

Continuous Monitoring

Automated mechanisms exist to correlate both technical and non-technical information from across the enterprise by a Security Incident Event Manager (SIEM) or similar automated tool, to enhance organization-wide situational awareness.


Login

Continuous Monitoring

Automated mechanisms exist to centrally collect, review and analyze audit records from multiple sources.


Login

Continuous Monitoring

Automated mechanisms exist to integrate the analysis of audit records with analysis of vulnerability scanners, network performance, system monitoring and other sources to further enhance the ability to identify inappropriate or unusual activity.


Login

Continuous Monitoring

Automated mechanisms exist to correlate information from audit records with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual or malevolent activity.


Login

Continuous Monitoring

Level N/A

Mechanisms exist to specify the permitted actions for both users and systems associated with the review, analysis and reporting of audit information.


Login