Under active development Content is continuously updated and improved

SM-25System Security Monitoring

>Control Description

Critical systems are monitored in accordance with predefined security criteria and alerts are sent to authorized personnel. Confirmed incidents are tracked to resolution.

Theme

Process

Type

Detective

Policy/Standard

Logging & Monitoring Standard

>Implementation Guidance

1. Ensure that Organization's Security Monitoring Standard includes requirements for responding to flagged system alerts and confirmed incidents. 2. Configure security monitoring tool to ensure that critical information system activity is monitored. 3. Ensure that the events are triaged and resolved by authorized personnel as applicable.

>Testing Procedure

1. Inspect Organization's Security Monitoring Standard to determine whether requirements are defined for responding to flagged system alerts and confirmed incidents. 2. For a sample of services, inspect security monitoring tool to determine whether critical information system activity is monitored. 3. Inspect a sample of security events to determine whether the events are triaged and resolved by authorized personnel as applicable.

>Audit Artifacts

E-SM-10
E-SM-19

>Framework Mappings

Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.

Ask AI

Configure your API key to use AI features.