Skip to main content

πŸ’Ό SI-4 INFORMATION SYSTEM MONITORING

Description​

The organization: SI-4a. Monitors the information system to detect: SI-4a.1. Attacks and indicators of potential attacks in accordance with [Assignment: organization-defined monitoring objectives]; and SI-4a.2. Unauthorized local, network, and remote connections; SI-4b. Identifies unauthorized use of the information system through [Assignment: organization-defined techniques and methods]; SI-4c. Deploys monitoring devices: SI-4c.1. Strategically within the information system to collect organization-determined essential information; and SI-4c.2. At ad hoc locations within the system to track specific types of transactions of interest to the organization; SI-4d. Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion; SI-4e. Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information; SI-4f. Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and SI-4g. Provides [Assignment: organization-defined information system monitoring information] to [Assignment: organization-defined personnel or roles] [Selection (one or more): as needed; [Assignment: organization-defined frequency]].

Similar​

  • Internal
    • ID: dec-c-7b942c5d

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.AE-1: A baseline of network operations and expected data flows for users and systems is established and managed1014
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.AE-2: Detected events are analyzed to understand attack targets and methods1823
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.AE-3: Event data are collected and correlated from multiple sources and sensors1837
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.AE-4: Impact of events is determined1313
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.CM-1: The network is monitored to detect potential cybersecurity events1841
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.CM-5: Unauthorized mobile code is detected1111
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events66
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed1823
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.DP-2: Detection activities comply with all applicable requirements66
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.DP-3: Detection processes are tested1313
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.DP-4: Event detection information is communicated2932
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.DP-5: Detection processes are continuously improved1315
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό ID.RA-1: Asset vulnerabilities are identified and documented1315
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.DS-5: Protections against data leaks are implemented4766
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.IP-8: Effectiveness of protection technologies is shared66
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό RS.AN-1: Notifications from detection systems are investigated1823
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό RS.CO-3: Information is shared consistent with response plans1617

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό SI-4 (1) SYSTEM-WIDE INTRUSION DETECTION SYSTEM
πŸ’Ό SI-4 (2) AUTOMATED TOOLS FOR REAL-TIME ANALYSIS
πŸ’Ό SI-4 (3) AUTOMATED TOOL INTEGRATION
πŸ’Ό SI-4 (4) INBOUND AND OUTBOUND COMMUNICATIONS TRAFFIC
πŸ’Ό SI-4 (5) SYSTEM-GENERATED ALERTS
πŸ’Ό SI-4 (6) RESTRICT NON-PRIVILEGED USERS
πŸ’Ό SI-4 (7) AUTOMATED RESPONSE TO SUSPICIOUS EVENTS
πŸ’Ό SI-4 (8) PROTECTION OF MONITORING INFORMATION
πŸ’Ό SI-4 (9) TESTING OF MONITORING TOOLS
πŸ’Ό SI-4 (10) VISIBILITY OF ENCRYPTED COMMUNICATIONS
πŸ’Ό SI-4 (11) ANALYZE COMMUNICATIONS TRAFFIC ANOMALIES
πŸ’Ό SI-4 (12) AUTOMATED ALERTS
πŸ’Ό SI-4 (13) ANALYZE TRAFFIC _ EVENT PATTERNS
πŸ’Ό SI-4 (14) WIRELESS INTRUSION DETECTION
πŸ’Ό SI-4 (15) WIRELESS TO WIRELINE COMMUNICATIONS
πŸ’Ό SI-4 (16) CORRELATE MONITORING INFORMATION
πŸ’Ό SI-4 (17) INTEGRATED SITUATIONAL AWARENESS
πŸ’Ό SI-4 (18) ANALYZE TRAFFIC _ COVERT EXFILTRATION
πŸ’Ό SI-4 (19) INDIVIDUALS POSING GREATER RISK
πŸ’Ό SI-4 (20) PRIVILEGED USERS
πŸ’Ό SI-4 (21) PROBATIONARY PERIODS
πŸ’Ό SI-4 (22) UNAUTHORIZED NETWORK SERVICES
πŸ’Ό SI-4 (23) HOST-BASED DEVICES
πŸ’Ό SI-4 (24) INDICATORS OF COMPROMISE