Skip to main content

💼 DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events

  • Contextual name: 💼 DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events
  • ID: /frameworks/nist-csf-v1.1/de-cm/03
  • Located in: 💼 Security Continuous Monitoring (DE.CM)

Description

Empty...

Similar

  • Sections
    • /frameworks/iso-iec-27001-2013/12/04/01
    • /frameworks/iso-iec-27001-2013/12/04/03
    • /frameworks/nist-sp-800-53-r4/ac/02
    • /frameworks/nist-sp-800-53-r4/au/12
    • /frameworks/nist-sp-800-53-r4/au/13
    • /frameworks/nist-sp-800-53-r4/ca/07
    • /frameworks/nist-sp-800-53-r4/cm/10
    • /frameworks/nist-sp-800-53-r4/cm/11
  • Internal
    • ID: dec-c-33b202e1

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 ISO/IEC 27001:2013 → 💼 A.12.4.1 Event logging1518
💼 ISO/IEC 27001:2013 → 💼 A.12.4.3 Administrator and operator logs78
💼 NIST SP 800-53 Revision 4 → 💼 AC-2 ACCOUNT MANAGEMENT1336
💼 NIST SP 800-53 Revision 4 → 💼 AU-12 AUDIT GENERATION3
💼 NIST SP 800-53 Revision 4 → 💼 AU-13 MONITORING FOR INFORMATION DISCLOSURE2
💼 NIST SP 800-53 Revision 4 → 💼 CA-7 CONTINUOUS MONITORING3
💼 NIST SP 800-53 Revision 4 → 💼 CM-10 SOFTWARE USAGE RESTRICTIONS1
💼 NIST SP 800-53 Revision 4 → 💼 CM-11 USER-INSTALLED SOFTWARE2

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 NIST CSF v2.0 → 💼 DE.CM-03: Personnel activity and technology usage are monitored to find potentially adverse events81

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (26)

PolicyLogic CountFlags
📝 AWS CloudTrail Log File Validation is not enabled 🟢1🟢 x6
📝 AWS CloudTrail S3 Bucket Access Logging is not enabled. 🟢1🟢 x6
📝 AWS IAM User has inline or directly attached policies 🟢1🟠 x1, 🟢 x5
📝 AWS RDS Instance Auto Minor Version Upgrade is not enabled 🟠🟢1🟠 x1, 🟢 x6
📝 AWS S3 Bucket Server Access Logging is not enabled 🟢1🟢 x6
📝 AWS VPC Flow Logs are not enabled 🟢1🟠 x1, 🟢 x5
📝 Azure App Service does not run the latest Java version 🟢🟢 x3
📝 Azure App Service does not run the latest PHP version 🟢🟢 x3
📝 Azure App Service does not run the latest Python version 🟢🟢 x3
📝 Azure Diagnostic Setting for Azure Key Vault is not enabled 🟢🟢 x3
📝 Azure PostgreSQL Flexible Server log_checkpoints Parameter is not set to ON 🟢1🟢 x6
📝 Azure PostgreSQL Flexible Server log_retention_days Parameter is less than 4 days 🟢1🟢 x6
📝 Azure PostgreSQL Single Server log_connections Parameter is not set to ON 🟢1🟢 x6
📝 Azure PostgreSQL Single Server log_disconnections Parameter is not set to ON 🟢1🟢 x6
📝 Azure SQL Server Auditing Retention is less than 90 days 🟢1🟢 x6
📝 Azure Storage Blob Logging is not enabled for Read, Write, and Delete requests 🟢1🟢 x6
📝 Azure Storage Queue Logging is not enabled for Read, Write, and Delete requests 🟢1🟢 x6
📝 Azure Subscription Activity Log Alert for Create or Update Network Security Group does not exist 🟢1🟢 x6
📝 Azure Subscription Activity Log Alert for Create or Update Security Solution does not exist 🟢1🟢 x6
📝 Azure Subscription Activity Log Alert for Create Policy Assignment does not exist 🟢1🟢 x6
📝 Azure Subscription Activity Log Alert for Delete Network Security Group does not exist 🟢1🟢 x6
📝 Azure Subscription Activity Log Alert for Delete Policy Assignment does not exist 🟢1🟢 x6
📝 Azure Subscription Activity Log Alert for Delete Security Solution does not exist 🟢1🟢 x6
📝 Google BigQuery Dataset is anonymously or publicly accessible 🟢1🟢 x6
📝 Google Cloud Audit Logging is not configured properly 🟢1🟢 x6
📝 Google Storage Bucket is anonymously or publicly accessible 🟢1🟢 x6

Internal Rules

RulePoliciesFlags
✉️ dec-x-0c82d7751
✉️ dec-x-9b79d91f1
✉️ dec-x-9c0416671
✉️ dec-x-20c9ef831
✉️ dec-x-24bba4831
✉️ dec-x-89d5ed7a1
✉️ dec-x-611eaa351
✉️ dec-x-879aa9961
✉️ dec-x-1518c16e1
✉️ dec-x-79579ed71
✉️ dec-x-215302da1
✉️ dec-x-9002886f1
✉️ dec-x-a20e54a01
✉️ dec-x-b1e1a4941
✉️ dec-x-b2ce0ca11
✉️ dec-x-c397d3ca2
✉️ dec-x-db1b7a1b1
✉️ dec-x-dc359e591
✉️ dec-x-e00143332
✉️ dec-x-f82b98491