SI-4(4)—Information System Monitoring
PBMM (P2)
Secret (P2)
Operational
>Control Description
INFORMATION SYSTEM MONITORING | INBOUND AND OUTBOUND COMMUNICATIONS TRAFFIC The information system monitors inbound and outbound communications traffic ⚙organization-defined frequency for unusual or unauthorized activities or conditions.
>Supplemental Guidance
Unusual/unauthorized activities or conditions related to information system inbound and outbound communications traffic include, for example, internal traffic that indicates the presence of malicious code within organizational information systems or propagating among system components, the unauthorized exporting of information, or signalling to external information systems. Evidence of malicious code is used to identify potentially compromised information systems or information system components.
>Tailoring Guidance
Control enhancement (4) ensures that the primary location for monitoring is at the ingress and egress to the organization.
Ask AI
Configure your API key to use AI features.