Skip to main content

๐Ÿ’ผ 67 Detection mechanisms typically include scanning, sensing and logging mechanisms which can be used to identify potential information security incidents. Monitoring processes could include the identification of unusual patterns of behaviour and logging that facilitates investigation and preserves forensic evidence. The strength and nature of monitoring controls would typically be commensurate with the impact of an information security incident. Monitoring processes would consider the broad set of events, ranging from the physical hardware layer to higher order business activities such as payments and changes to user access.

  • Contextual name: ๐Ÿ’ผ 67 Detection mechanisms typically include scanning, sensing and logging mechanisms which can be used to identify potential information security incidents. Monitoring processes could include the identification of unusual patterns of behaviour and logging that facilitates investigation and preserves forensic evidence. The strength and nature of monitoring controls would typically be commensurate with the impact of an information security incident. Monitoring processes would consider the broad set of events, ranging from the physical hardware layer to higher order business activities such as payments and changes to user access.
  • ID: /frameworks/apra-cpg-234/26/67
  • Located in: ๐Ÿ’ผ 26 Incident management - Detection of security compromises

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-c-7d43e154

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 67a network and user profiling that establishes a baseline of normal activity which, when combined with logging and alerting mechanisms, can enable detection of anomalous activity;1821
๐Ÿ’ผ 67b scanning for unauthorised hardware, software and changes to configurations;78
๐Ÿ’ผ 67c sensors that provide an alert when a measure breaches a defined threshold(s) (e.g. device, server and network activity);1010
๐Ÿ’ผ 67d logging and alerting of access to sensitive data or unsuccessful logon attempts to identify potential unauthorised access;11
๐Ÿ’ผ 67e users with privileged access accounts subject to a greater level of monitoring in light of the heightened risks involved.11