Under active development Content is continuously updated and improved

SI-4(12)Information System Monitoring

PBMM (P2)
Secret (P2)
Operational

>Control Description

INFORMATION SYSTEM MONITORING | AUTOMATED ALERTS The organization employs automated mechanisms to alert security personnel of the following inappropriate or unusual activities with security implications: organization-defined activities that trigger alerts.

>Supplemental Guidance

This control enhancement focuses on the security alerts generated by organizations and transmitted using automated means. In contrast to the alerts generated by information systems in SI-4 (5), which tend to focus on information sources internal to the systems (e.g., audit records), the sources of information for this enhancement can include other entities as well (e.g., suspicious activity reports, reports on potential insider threats). Related controls: AC-18, IA-3.

>Tailoring Guidance

Control enhancements (7) and (12) expand on control enhancement (2).

>Profile-Specific Parameters

(12) list [list of inappropriate or unusual activities that trigger alerts]

Ask AI

Configure your API key to use AI features.