SI-4 Information System Monitoring
GPTKB entity
Statements (36)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:NIST_Special_Publication
|
gptkbp:appliesTo |
Federal information systems
|
gptkbp:category |
gptkb:Security_Control
|
gptkbp:controlIdentifier |
SI-4
|
gptkbp:documentedIn |
gptkb:NIST_Special_Publication_800-53_Revision_5
|
gptkbp:family |
gptkb:System_and_Information_Integrity
|
https://www.w3.org/2000/01/rdf-schema#label |
SI-4 Information System Monitoring
|
gptkbp:improves |
SI-4(1) Automated Tools
SI-4(10) Physical Devices Monitoring SI-4(11) Analyze Traffic/Patterns SI-4(12) Automated Alerts SI-4(13) Analyze Traffic/Trend Analysis SI-4(14) Wireless Intrusion Detection SI-4(15) Automated Traffic Analysis SI-4(16) Correlate Monitoring Information SI-4(17) Privacy Monitoring SI-4(2) Automated Monitoring SI-4(3) Analyze Communications Traffic SI-4(5) System-generated Alerts SI-4(6) Nonlocal Maintenance Monitoring SI-4(7) Unauthorized Mobile Code SI-4(9) Analyze Traffic/Attribution SI-4(4) Inbound and Outbound Communications Traffic SI-4(8) Unauthorized Use of Portable Storage Devices |
gptkbp:partOf |
gptkb:NIST_SP_800-53
|
gptkbp:purpose |
Detect attacks and indicators of potential attacks
Identify unauthorized use of information systems |
gptkbp:relatedTo |
gptkb:Security_Information_and_Event_Management
Continuous Monitoring |
gptkbp:requires |
gptkb:Federal_Information_Security_Modernization_Act_(FISMA)
Analysis of monitoring information Monitoring of information system to detect events Reporting of monitoring results |
gptkbp:bfsParent |
gptkb:System_and_Information_Integrity
gptkb:System_and_Information_Integrity_(SI) |
gptkbp:bfsLayer |
7
|