Under active development Content is continuously updated and improved

MON-16.3Unauthorized Activities

Weight: 8

>Control Description

Mechanisms exist to monitor for unauthorized activities, accounts, connections, devices and software.

>Cross-Framework Mappings

NIST CSF 2.0

CIS Controls v8

UK DEF STAN 05-138

CIS Controls v8.1 (Detailed)

Ask AI

Configure your API key to use AI features.