💼 8.16 Monitoring activities
- ID:
/frameworks/iso-iec-27001-2022/08/16
Description
Networks, systems and applications shall be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents.
Similar
- Internal
- ID:
dec-c-abd0003f
- ID:
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|
Policies (5)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ AWS VPC Flow Logs are not enabled🟢 | 1 | 🟠 x1, 🟢 x5 | no data |
| 🛡️ Azure Network Security Group allows public access to HTTP(S) ports🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Network Security Group allows public access to RDP port🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Network Security Group allows public access to SSH port🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Subnetwork Flow Logs are not enabled🟢 | 1 | 🟢 x6 | no data |
Internal Rules
| Rule | Policies | Flags |
|---|---|---|
| ✉️ dec-x-4c15a09f | 1 | |
| ✉️ dec-x-9c041667 | 1 | |
| ✉️ dec-x-599c86b4 | 1 | |
| ✉️ dec-x-f4cc003a | 1 |