Capacity
CCI-002661
Monitor inbound communications traffic per organization-defined frequency for organization-defined unusual or unauthorized activities or conditions.
Choose one
1
Rule
Severity: Medium
Kona Site Defender providing content filtering must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.
2
Rule
Severity: Medium
The ALG providing content filtering must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.
1
Rule
Severity: Medium
The DBN-6300 must continuously monitor inbound communications traffic between the application tier and the database tier for unusual/unauthorized activities or conditions at the SQL level.
1
Rule
Severity: Medium
The DataPower Gateway providing content filtering must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.
4
Rule
Severity: Medium
The IDPS must continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions.
2
Rule
Severity: High
The Juniper SRX Services Gateway Firewall must continuously monitor all inbound communications traffic for unusual/unauthorized activities or conditions.
1
Rule
Severity: Medium
Reverse proxy Symantec ProxySG providing content filtering must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.
2
Rule
Severity: Medium
The Cisco ASA must be configured to block inbound traffic containing unauthorized activities or conditions.
2
Rule
Severity: Medium
The Palo Alto Networks security platform must continuously monitor inbound communications traffic crossing internal security boundaries.
2
Rule
Severity: Medium
The Palo Alto Networks security platform must continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions.
1
Rule
Severity: Medium
The BIG-IP ASM module must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.
1
Rule
Severity: Medium
The BIG-IP Core implementation must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.
1
Rule
Severity: Medium
The Mission Owner of the Infrastructure as a Service (IaaS) or Platform as a Service (PaaS) must continuously monitor and protect inbound communications from external systems, other IaaS within the same cloud service environment, or collocated mission applications for unusual or unauthorized activities or conditions.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%