DE.CM-01:
Networks and network services are monitored to find potentially adverse events
Implementation Examples
Ex1:
Monitor DNS, BGP, and other network services for adverse events
Ex2:
Monitor wired and wireless networks for connections from unauthorized endpoints
Ex3:
Monitor facilities for unauthorized or rogue wireless networks
Ex4:
Compare actual network flows against baselines to detect deviations
Ex5:
Monitor network communications to identify changes in security postures for zero trust purposes