19Continuous Monitoring (DE.CM)
In the vast and intricate digital security landscape, the meticulous monitoring of networks, environments, personnel, and resources emerges as a cornerstone of the defense, weaving a multilayered safeguard that enhances the organization’s resilience and responsiveness to the ever-evolving cybersecurity challenges.
In the modern digital age, monitoring networks, physical environments, personnel activities, external service providers, and computing resources have become indispensable for maintaining organizational security. Implementing robust detection systems like intrusion detection systems (IDS) and employing real-time traffic and anomaly detection techniques are crucial for identifying potentially adverse events in networks and network services. Similarly, physical security monitoring incorporates surveillance, environmental sensors, and regular audits to protect an organization’s physical assets. Monitoring personnel activity and technology usage, including implementing user and entity behavior analytics (UEBA) and data loss prevention (DLP) technologies, ensures compliance and safeguards against internal threats. Furthermore, overseeing external service provider activities through clear contractual requirements and regular security assessments helps manage third-party risks. Finally, comprehensive monitoring of computing hardware and software through endpoint detection and response (EDR) solutions, application performance monitoring ( ...
Get A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.