Skip to content

SI-4: System Monitoring

An OSCAL Control

Statement

    • a.

      Monitor the system to detect:

      • 1.

        Attacks and indicators of potential attacks in accordance with the following monitoring objectives: ; and

      • 2.

        Unauthorized local, network, and remote connections;

    • b.

      Identify unauthorized use of the system through the following techniques and methods: ;

    • c.

      Invoke internal monitoring capabilities or deploy monitoring devices:

      • 1.

        Strategically within the system to collect organization-determined essential information; and

      • 2.

        At ad hoc locations within the system to track specific types of transactions of interest to the organization;

    • d.

      Analyze detected events and anomalies;

    • e.

      Adjust the level of system monitoring activity when there is a change in risk to organizational operations and assets, individuals, other organizations, or the Nation;

    • f.

      Obtain legal opinion regarding system monitoring activities; and

    • g.

      Provide to .