DE.CM-01:

Networks and network services are monitored to find potentially adverse events

Implementation Examples

Ex1:

Monitor DNS, BGP, and other network services for adverse events

Ex2:

Monitor wired and wireless networks for connections from unauthorized endpoints

Ex3:

Monitor facilities for unauthorized or rogue wireless networks

Ex4:

Compare actual network flows against baselines to detect deviations

Ex5:

Monitor network communications to identify changes in security postures for zero trust purposes