SI-4(1)—System Monitoring | System-wide Intrusion Detection System
IL4 Mod
IL4 High
IL5
IL6
>Control Description
Connect and configure individual intrusion detection tools into a system-wide intrusion detection system.
>DoD Impact Level Requirements
No specific parameter values or requirements for this impact level.
>Discussion
Linking individual intrusion detection tools into a system-wide intrusion detection system provides additional coverage and effective detection capabilities. The information contained in one intrusion detection tool can be shared widely across the organization, making the system-wide detection capability more robust and powerful.
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What policies and procedures govern system-wide intrusion detection system?
- •Who is responsible for monitoring system and information integrity?
- •How frequently are integrity monitoring processes reviewed and updated?
Technical Implementation:
- •What technical controls detect and respond to system-wide intrusion detection system issues?
- •How are integrity violations identified and reported?
- •What automated tools support system and information integrity monitoring?
Evidence & Documentation:
- •Can you provide recent integrity monitoring reports or alerts?
- •What logs demonstrate that SI-4(1) is actively implemented?
- •Where is evidence of integrity monitoring maintained and for how long?
Ask AI
Configure your API key to use AI features.