Skip to main content

πŸ’Ό SI-4 INFORMATION SYSTEM MONITORING

Description​

The organization: SI-4a. Monitors the information system to detect: SI-4a.1. Attacks and indicators of potential attacks in accordance with [Assignment: organization-defined monitoring objectives]; and SI-4a.2. Unauthorized local, network, and remote connections; SI-4b. Identifies unauthorized use of the information system through [Assignment: organization-defined techniques and methods]; SI-4c. Deploys monitoring devices: SI-4c.1. Strategically within the information system to collect organization-determined essential information; and SI-4c.2. At ad hoc locations within the system to track specific types of transactions of interest to the organization; SI-4d. Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion; SI-4e. Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information; SI-4f. Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and SI-4g. Provides [Assignment: organization-defined information system monitoring information] to [Assignment: organization-defined personnel or roles] [Selection (one or more): as needed; [Assignment: organization-defined frequency]].

Similar​

  • Internal
    • ID: dec-c-7b942c5d

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.AE-1: A baseline of network operations and expected data flows for users and systems is established and managed1011
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.AE-2: Detected events are analyzed to understand attack targets and methods1922
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.AE-3: Event data are collected and correlated from multiple sources and sensors1922
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.AE-4: Impact of events is determined1414
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.CM-1: The network is monitored to detect potential cybersecurity events1928
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.CM-5: Unauthorized mobile code is detected1111
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events77
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed1923
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.DP-2: Detection activities comply with all applicable requirements77
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.DP-3: Detection processes are tested1414
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.DP-4: Event detection information is communicated3033
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.DP-5: Detection processes are continuously improved1416
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό ID.RA-1: Asset vulnerabilities are identified and documented1415
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.DS-5: Protections against data leaks are implemented4351
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.IP-8: Effectiveness of protection technologies is shared77
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό RS.AN-1: Notifications from detection systems are investigated1922
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό RS.CO-3: Information is shared consistent with response plans1617

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό SI-4 (1) SYSTEM-WIDE INTRUSION DETECTION SYSTEM
πŸ’Ό SI-4 (2) AUTOMATED TOOLS FOR REAL-TIME ANALYSIS
πŸ’Ό SI-4 (3) AUTOMATED TOOL INTEGRATION
πŸ’Ό SI-4 (4) INBOUND AND OUTBOUND COMMUNICATIONS TRAFFIC
πŸ’Ό SI-4 (5) SYSTEM-GENERATED ALERTS
πŸ’Ό SI-4 (6) RESTRICT NON-PRIVILEGED USERS
πŸ’Ό SI-4 (7) AUTOMATED RESPONSE TO SUSPICIOUS EVENTS
πŸ’Ό SI-4 (8) PROTECTION OF MONITORING INFORMATION
πŸ’Ό SI-4 (9) TESTING OF MONITORING TOOLS
πŸ’Ό SI-4 (10) VISIBILITY OF ENCRYPTED COMMUNICATIONS
πŸ’Ό SI-4 (11) ANALYZE COMMUNICATIONS TRAFFIC ANOMALIES
πŸ’Ό SI-4 (12) AUTOMATED ALERTS
πŸ’Ό SI-4 (13) ANALYZE TRAFFIC _ EVENT PATTERNS
πŸ’Ό SI-4 (14) WIRELESS INTRUSION DETECTION
πŸ’Ό SI-4 (15) WIRELESS TO WIRELINE COMMUNICATIONS
πŸ’Ό SI-4 (16) CORRELATE MONITORING INFORMATION
πŸ’Ό SI-4 (17) INTEGRATED SITUATIONAL AWARENESS
πŸ’Ό SI-4 (18) ANALYZE TRAFFIC _ COVERT EXFILTRATION
πŸ’Ό SI-4 (19) INDIVIDUALS POSING GREATER RISK
πŸ’Ό SI-4 (20) PRIVILEGED USERS
πŸ’Ό SI-4 (21) PROBATIONARY PERIODS
πŸ’Ό SI-4 (22) UNAUTHORIZED NETWORK SERVICES
πŸ’Ό SI-4 (23) HOST-BASED DEVICES
πŸ’Ό SI-4 (24) INDICATORS OF COMPROMISE