Skip to main content

💼 8.16 Monitoring activities

  • ID: /frameworks/iso-iec-27001-2022/08/16

Description

Networks, systems and applications shall be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents.

Similar

  • Internal
    • ID: dec-c-abd0003f

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (5)

PolicyLogic CountFlagsCompliance
🛡️ AWS VPC Flow Logs are not enabled🟢1🟠 x1, 🟢 x5no data
🛡️ Azure Network Security Group allows public access to HTTP(S) ports🟢1🟢 x6no data
🛡️ Azure Network Security Group allows public access to RDP port🟢1🟢 x6no data
🛡️ Azure Network Security Group allows public access to SSH port🟢1🟢 x6no data
🛡️ Google GCE Subnetwork Flow Logs are not enabled🟢1🟢 x6no data

Internal Rules

RulePoliciesFlags
✉️ dec-x-4c15a09f1
✉️ dec-x-9c0416671
✉️ dec-x-599c86b41
✉️ dec-x-f4cc003a1