myctrl.tools
Compare

AU-13(2)Review Of Monitored Sites

>Control Description

Review the list of open-source information sites being monitored organization-defined frequency.

>Supplemental Guidance

Reviewing the current list of open-source information sites being monitored on a regular basis helps to ensure that the selected sites remain relevant. The review also provides the opportunity to add new open-source information sites with the potential to provide evidence of unauthorized disclosure of organizational information. The list of sites monitored can be guided and informed by threat intelligence of other credible sources of information.

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of AU-13(2) (Review Of Monitored Sites)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring AU-13(2)?
  • How frequently is the AU-13(2) policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to AU-13(2)?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce AU-13(2) requirements.
  • What automated tools, systems, or technologies are deployed to implement AU-13(2)?
  • How is AU-13(2) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce AU-13(2) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of AU-13(2)?
  • What audit logs, records, reports, or monitoring data validate AU-13(2) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of AU-13(2) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate AU-13(2) compliance?

Ask AI

Configure your API key to use AI features.