Skip to main content

💼 8.16 Monitoring activities

  • Contextual name: 💼 8.16 Monitoring activities
  • ID: /frameworks/iso-iec-27001-2022/08/16
  • Located in: 💼 8 Technological controls

Description

Networks, systems and applications shall be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents.

Similar

  • Internal
    • ID: dec-c-abd0003f

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (5)

PolicyLogic CountFlags
📝 AWS VPC Flow Logs are not enabled 🟢1🟠 x1, 🟢 x5
📝 Azure Network Security Group allows public access to HTTP(S) ports 🟢1🟢 x6
📝 Azure Network Security Group allows public access to RDP port 🟢1🟢 x6
📝 Azure Network Security Group allows public access to SSH port 🟢1🟢 x6
📝 Google GCE Subnetwork Flow Logs are not enabled 🟢1🟢 x6

Internal Rules

RulePoliciesFlags
✉️ dec-x-4c15a09f1
✉️ dec-x-9c0416671
✉️ dec-x-599c86b41
✉️ dec-x-f4cc003a1