3.14.6—Monitor Communications for Attacks Assessment
>Control Description
Determine if: the system is monitored to detect attacks and indicators of potential attacks.; inbound communications traffic is monitored to detect attacks and indicators of potential attacks.; outbound communications traffic is monitored to detect attacks and indicators of potential attacks.
Ask AI
Configure your API key to use AI features.