SM-18—Prohibited Activity Monitoring: Remote Access
>Control Description
Remote sessions are monitored for prohibited activity.
Theme
Technology
Type
Detective
Policy/Standard
Logging & Monitoring Standard>Implementation Guidance
1. Ensure that the monitoring reports or evidence of logs from remote sessions are reviewed for prohibited activity.
>Testing Procedure
1. Review the monitoring reports or evidence of logs from remote sessions to determine that the remote sessions are reviewed for prohibited activity.
>Audit Artifacts
E-SM-15
>Framework Mappings
Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.
Ask AI
Configure your API key to use AI features.