2.0
Level 1 Description: System monitoring includes external and internal monitoring. System monitoring can detect unauthorized use of organizational systems....
Mon, 17 Jul, 2023 at 8:41 AM
Level 2 Description: The intent of this requirement is to periodically re-evaluate which logged events will continue to be included in the list of even...
Mon, 17 Jul, 2023 at 7:35 AM
Level 1 Description: There are many publicly available sources of system security alerts and advisories. For example, the Department of Homeland Security’...
Mon, 17 Jul, 2023 at 8:41 AM
Level 2 Description: Audit logging process failures include software and hardware errors, failures in the audit record capturing mechanisms, and audit ...
Mon, 17 Jul, 2023 at 7:50 AM
Level 1 Description: Designated locations include system entry and exit points which may include firewalls, remote-access servers, workstations, electroni...
Mon, 17 Jul, 2023 at 7:59 AM
Level 2 Description: Correlating audit record review, analysis, and reporting processes helps to ensure that they do not operate independently, but ra...
Mon, 17 Jul, 2023 at 8:27 AM
Level 1 Description: Organizations identify systems that are affected by announced software and firmware flaws including potential vulnerabilities result...
Mon, 17 Jul, 2023 at 8:36 AM
Level 2 Description: Audit record reduction is a process that manipulates collected audit information and organizes such information in a summary forma...
Mon, 17 Jul, 2023 at 8:40 AM
Level 2 Description: Internal system clocks are used to generate time stamps, which include date and time. Time is expressed in Coordinated Universal T...
Mon, 17 Jul, 2023 at 8:53 AM
Level 2 Description: Information at rest refers to the state of information when it is not in process or in transit and is located on storage devices as s...
Mon, 17 Jul, 2023 at 9:00 AM