Skip to main content

💼 DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed

  • ID: /frameworks/nist-csf-v1.1/de-cm/07

Description

Empty...

Similar

  • Sections
    • /frameworks/iso-iec-27001-2013/12/04/01
    • /frameworks/iso-iec-27001-2013/14/02/07
    • /frameworks/iso-iec-27001-2013/15/02/01
    • /frameworks/nist-sp-800-53-r4/au/12
    • /frameworks/nist-sp-800-53-r4/ca/07
    • /frameworks/nist-sp-800-53-r4/cm/03
    • /frameworks/nist-sp-800-53-r4/cm/08
    • /frameworks/nist-sp-800-53-r4/pe/03
    • /frameworks/nist-sp-800-53-r4/pe/06
    • /frameworks/nist-sp-800-53-r4/pe/20
    • /frameworks/nist-sp-800-53-r4/si/04
  • Internal
    • ID: dec-c-381c8ec8

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 ISO/IEC 27001:2013 → 💼 A.12.4.1 Event logging1518no data
💼 ISO/IEC 27001:2013 → 💼 A.14.2.7 Outsourced developmentno data
💼 ISO/IEC 27001:2013 → 💼 A.15.2.1 Monitoring and review of supplier servicesno data
💼 NIST SP 800-53 Revision 4 → 💼 AU-12 AUDIT GENERATION3no data
💼 NIST SP 800-53 Revision 4 → 💼 CA-7 CONTINUOUS MONITORING3no data
💼 NIST SP 800-53 Revision 4 → 💼 CM-3 CONFIGURATION CHANGE CONTROL611no data
💼 NIST SP 800-53 Revision 4 → 💼 CM-8 INFORMATION SYSTEM COMPONENT INVENTORY912no data
💼 NIST SP 800-53 Revision 4 → 💼 PE-3 PHYSICAL ACCESS CONTROL6no data
💼 NIST SP 800-53 Revision 4 → 💼 PE-6 MONITORING PHYSICAL ACCESS4no data
💼 NIST SP 800-53 Revision 4 → 💼 PE-20 ASSET MONITORING AND TRACKINGno data
💼 NIST SP 800-53 Revision 4 → 💼 SI-4 INFORMATION SYSTEM MONITORING241no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 NIST CSF v2.0 → 💼 DE.CM-01: Networks and network services are monitored to find potentially adverse events145no data
💼 NIST CSF v2.0 → 💼 DE.CM-03: Personnel activity and technology usage are monitored to find potentially adverse events85no data
💼 NIST CSF v2.0 → 💼 DE.CM-06: External service provider activities and services are monitored to find potentially adverse events35no data
💼 NIST CSF v2.0 → 💼 DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events142no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (24)

PolicyLogic CountFlagsCompliance
🛡️ AWS CloudTrail Log File Validation is not enabled🟢1🟢 x6no data
🛡️ AWS CloudTrail S3 Bucket Access Logging is not enabled.🟢1🟢 x6no data
🛡️ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports🟢1🟢 x6no data
🛡️ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports🟢1🟢 x6no data
🛡️ AWS S3 Bucket Server Access Logging is not enabled🟢1🟢 x6no data
🛡️ AWS VPC Flow Logs are not enabled🟢1🟠 x1, 🟢 x5no data
🛡️ Azure Diagnostic Setting for Azure Key Vault is not enabled🟢⚪🟢 x2, ⚪ x1no data
🛡️ Azure PostgreSQL Flexible Server connection_throttle.enable Parameter is not set to ON🟢1🟢 x6no data
🛡️ Azure PostgreSQL Flexible Server log_checkpoints Parameter is not set to ON🟢1🟢 x6no data
🛡️ Azure PostgreSQL Flexible Server log_retention_days Parameter is less than 4 days🟢1🟢 x6no data
🛡️ Azure PostgreSQL Single Server log_connections Parameter is not set to ON🟢1🟢 x6no data
🛡️ Azure PostgreSQL Single Server log_disconnections Parameter is not set to ON🟢1🟢 x6no data
🛡️ Azure SQL Server Auditing is not enabled🟢1🟢 x6no data
🛡️ Azure SQL Server Auditing Retention is less than 90 days🟢1🟢 x6no data
🛡️ Azure Storage Blob Logging is not enabled for Read, Write, and Delete requests🟢1🟢 x6no data
🛡️ Azure Storage Queue Logging is not enabled for Read, Write, and Delete requests🟢1🟢 x6no data
🛡️ Azure Subscription Activity Log Alert for Create or Update Network Security Group does not exist🟢1🟢 x6no data
🛡️ Azure Subscription Activity Log Alert for Create or Update Security Solution does not exist🟢1🟢 x6no data
🛡️ Azure Subscription Activity Log Alert for Create Policy Assignment does not exist🟢1🟢 x6no data
🛡️ Azure Subscription Activity Log Alert for Delete Network Security Group does not exist🟢1🟢 x6no data
🛡️ Azure Subscription Activity Log Alert for Delete Policy Assignment does not exist🟢1🟢 x6no data
🛡️ Azure Subscription Activity Log Alert for Delete Security Solution does not exist🟢1🟢 x6no data
🛡️ Google Cloud Audit Logging is not configured properly🟢1🟢 x6no data
🛡️ Google GCE Firewall Rule logging is disabled🟢1🟢 x6no data

Internal Rules

RulePoliciesFlags
✉️ dec-x-0c82d7751
✉️ dec-x-9b79d91f1
✉️ dec-x-9c0416671
✉️ dec-x-20c9ef831
✉️ dec-x-24bba4831
✉️ dec-x-36ced3d11
✉️ dec-x-89d5ed7a1
✉️ dec-x-611eaa351
✉️ dec-x-850beea81
✉️ dec-x-1518c16e1
✉️ dec-x-79579ed71
✉️ dec-x-9002886f1
✉️ dec-x-b1e1a4941
✉️ dec-x-b2ce0ca11
✉️ dec-x-c397d3ca2
✉️ dec-x-db1b7a1b1
✉️ dec-x-dc359e591
✉️ dec-x-e00143332