SM-25—System Security Monitoring
>Control Description
Theme
Type
Policy/Standard
Logging & Monitoring Standard>Implementation Guidance
1. Ensure that Organization's Security Monitoring Standard includes requirements for responding to flagged system alerts and confirmed incidents. 2. Configure security monitoring tool to ensure that critical information system activity is monitored. 3. Ensure that the events are triaged and resolved by authorized personnel as applicable.
>Testing Procedure
1. Inspect Organization's Security Monitoring Standard to determine whether requirements are defined for responding to flagged system alerts and confirmed incidents. 2. For a sample of services, inspect security monitoring tool to determine whether critical information system activity is monitored. 3. Inspect a sample of security events to determine whether the events are triaged and resolved by authorized personnel as applicable.
>Audit Artifacts
>Framework Mappings
Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.
Ask AI
Configure your API key to use AI features.