Skip to main content

💼 SI-4 INFORMATION SYSTEM MONITORING

Description​

The organization: SI-4a. Monitors the information system to detect: SI-4a.1. Attacks and indicators of potential attacks in accordance with [Assignment: organization-defined monitoring objectives]; and SI-4a.2. Unauthorized local, network, and remote connections; SI-4b. Identifies unauthorized use of the information system through [Assignment: organization-defined techniques and methods]; SI-4c. Deploys monitoring devices: SI-4c.1. Strategically within the information system to collect organization-determined essential information; and SI-4c.2. At ad hoc locations within the system to track specific types of transactions of interest to the organization; SI-4d. Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion; SI-4e. Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information; SI-4f. Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and SI-4g. Provides [Assignment: organization-defined information system monitoring information] to [Assignment: organization-defined personnel or roles] [Selection (one or more): as needed; [Assignment: organization-defined frequency]].

Similar​

  • Internal
    • ID: dec-c-7b942c5d

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
💼 NIST CSF v1.1 → 💼 DE.AE-1: A baseline of network operations and expected data flows for users and systems is established and managed1014
💼 NIST CSF v1.1 → 💼 DE.AE-2: Detected events are analyzed to understand attack targets and methods1823
💼 NIST CSF v1.1 → 💼 DE.AE-3: Event data are collected and correlated from multiple sources and sensors1837
💼 NIST CSF v1.1 → 💼 DE.AE-4: Impact of events is determined1313
💼 NIST CSF v1.1 → 💼 DE.CM-1: The network is monitored to detect potential cybersecurity events1841
💼 NIST CSF v1.1 → 💼 DE.CM-5: Unauthorized mobile code is detected1111
💼 NIST CSF v1.1 → 💼 DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events66
💼 NIST CSF v1.1 → 💼 DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed1823
💼 NIST CSF v1.1 → 💼 DE.DP-2: Detection activities comply with all applicable requirements66
💼 NIST CSF v1.1 → 💼 DE.DP-3: Detection processes are tested1313
💼 NIST CSF v1.1 → 💼 DE.DP-4: Event detection information is communicated2932
💼 NIST CSF v1.1 → 💼 DE.DP-5: Detection processes are continuously improved1315
💼 NIST CSF v1.1 → 💼 ID.RA-1: Asset vulnerabilities are identified and documented1315
💼 NIST CSF v1.1 → 💼 PR.DS-5: Protections against data leaks are implemented4766
💼 NIST CSF v1.1 → 💼 PR.IP-8: Effectiveness of protection technologies is shared66
💼 NIST CSF v1.1 → 💼 RS.AN-1: Notifications from detection systems are investigated1823
💼 NIST CSF v1.1 → 💼 RS.CO-3: Information is shared consistent with response plans1617

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 SI-4 (1) SYSTEM-WIDE INTRUSION DETECTION SYSTEM
💼 SI-4 (2) AUTOMATED TOOLS FOR REAL-TIME ANALYSIS
💼 SI-4 (3) AUTOMATED TOOL INTEGRATION
💼 SI-4 (4) INBOUND AND OUTBOUND COMMUNICATIONS TRAFFIC
💼 SI-4 (5) SYSTEM-GENERATED ALERTS
💼 SI-4 (6) RESTRICT NON-PRIVILEGED USERS
💼 SI-4 (7) AUTOMATED RESPONSE TO SUSPICIOUS EVENTS
💼 SI-4 (8) PROTECTION OF MONITORING INFORMATION
💼 SI-4 (9) TESTING OF MONITORING TOOLS
💼 SI-4 (10) VISIBILITY OF ENCRYPTED COMMUNICATIONS
💼 SI-4 (11) ANALYZE COMMUNICATIONS TRAFFIC ANOMALIES
💼 SI-4 (12) AUTOMATED ALERTS
💼 SI-4 (13) ANALYZE TRAFFIC _ EVENT PATTERNS
💼 SI-4 (14) WIRELESS INTRUSION DETECTION
💼 SI-4 (15) WIRELESS TO WIRELINE COMMUNICATIONS
💼 SI-4 (16) CORRELATE MONITORING INFORMATION
💼 SI-4 (17) INTEGRATED SITUATIONAL AWARENESS
💼 SI-4 (18) ANALYZE TRAFFIC _ COVERT EXFILTRATION
💼 SI-4 (19) INDIVIDUALS POSING GREATER RISK
💼 SI-4 (20) PRIVILEGED USERS
💼 SI-4 (21) PROBATIONARY PERIODS
💼 SI-4 (22) UNAUTHORIZED NETWORK SERVICES
💼 SI-4 (23) HOST-BASED DEVICES
💼 SI-4 (24) INDICATORS OF COMPROMISE