SI-4(5)—Information System Monitoring
>Control Description
>Supplemental Guidance
Alerts may be generated from a variety of sources, including, for example, audit records or inputs from malicious code protection mechanisms, intrusion detection or prevention mechanisms, or boundary protection devices such as firewalls, gateways, and routers. Alerts can be transmitted, for example, telephonically, by electronic mail messages, or by text messaging. Organizational personnel on the notification list can include, for example, system administrators, mission/business owners, system owners, or information system security officers.
Related controls: AU-5, PE-6.
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.
>Profile-Specific Parameters
indicators [Authorizer defined list of compromise indicators]
Ask AI
Configure your API key to use AI features.