monitoring Controls
13 controls across 5 frameworks.
CISA CPG
CMMC L1
HIPAA
NIST CSF
Networks and network services are monitored to detect adverse events
Detect / Continuous Monitoring
Monitoring for unauthorized personnel, connections, devices, and software is performed
Detect / Continuous Monitoring
Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events
Detect / Continuous Monitoring
Log records are generated and made available for continuous monitoring
Protect / Platform Security
SOC2
Capacity is managed to ensure system availability
Availability / Availability
Relevant security information is obtained and used
Security / Communication and Information
Security controls are evaluated on an ongoing basis
Security / Monitoring Activities
Control deficiencies are identified, evaluated, and communicated
Security / Monitoring Activities
Anomalies and security events are detected and monitored
Security / System Operations