03.14.06: System Monitoring

Control Familly: System and Information Integrity

SPRS: N/A

Top Ten Failed Requirement: N/A

Supporting Publications:

  • SP 800-61 [47]

  • SP 800-83 [76]

  • SP 800-92 [35]

  • SP 800-94 [29]

  • SP 800-137 [49]

  • SP 800-177 [70]

Referenced in: N/A

Control Type: N/A

CPCSC Level 2: 03.14.06

CMMC Level(s): N/A

Derived From: NIST SP 800-53r5

  • SI-04

  • SI-04(04)

a. Monitor the system to detect:

b. Attacks and indicators of potential attacks and

c. Unauthorized connections.

d. Identify unauthorized use of the system.

e. Monitor inbound and outbound communications traffic to detect unusual or unauthorized activities or conditions.

Discussion:

System monitoring involves external and internal monitoring. Internal monitoring includes the observation of events that occur within the system. External monitoring includes the observation of events that occur at the system boundary. Organizations can monitor the system by observing audit record activities in real time or by observing other system aspects, such as access patterns, characteristics of access, and other actions. The monitoring objectives may guide determination of the events.

A system monitoring capability is achieved through a variety of tools and techniques (e.g., audit record monitoring software, intrusion detection systems, intrusion prevention systems, malicious code protection software, scanning tools, network monitoring software). Strategic locations for monitoring devices include selected perimeter locations and near server farms that support critical applications with such devices being employed at managed system interfaces. The granularity of monitoring the information collected is based on organizational monitoring objectives and the capability of the system to support such objectives.

Systems connections can be network, remote, or local. A network connection is any connection with a device that communicates through a network (e.g., local area network, the internet). A remote connection is any connection with a device that communicates through an external network (e.g., the internet). Network, remote, and local connections can be either wired or wireless.

Unusual or unauthorized activities or conditions related to inbound and outbound communications traffic include internal traffic that indicates the presence of malicious code in the system or propagating among system components, the unauthorized export of information, or signaling to external systems. Evidence of malicious code is used to identify a potentially compromised system. System monitoring requirements, including the need for types of system monitoring, may be referenced in other requirements.

Assessment Methods and Objectives

Examine [SELECT FROM: system and information integrity policy and procedures; procedures for system monitoring tools and techniques; continuous monitoring strategy; facility diagram or layout; system design documentation; locations within the system where monitoring devices are deployed; system configuration settings; system protocols; system audit records; system security plan; other relevant documents or records]

Interview [SELECT FROM: personnel with responsibilities for installing, configuring, or maintaining the system; personnel with system monitoring responsibilities; personnel with intrusion detection responsibilities; personnel with information security responsibilities; system administrators]

Test [SELECT FROM: processes for intrusion detection and system monitoring; mechanisms for supporting or implementing system monitoring capabilities; mechanisms for supporting or implementing intrusion detection and system monitoring capabilities; mechanisms for supporting or implementing the monitoring of inbound and outbound communications traffic]

NIST SP 800-171A r3 Determining Statements Determine if:

A.03.14.06.a.01[01]: the system is monitored to detect attacks.

A.03.14.06.a.01[02]: the system is monitored to detect indicators of potential attacks.

A.03.14.06.a.02: the system is monitored to detect unauthorized connections.

A.03.14.06.b: unauthorized use of the system is identified.

A.03.14.06.c[01]: inbound communications traffic is monitored to detect unusual or unauthorized activities or conditions.

A.03.14.06.c[02]: outbound communications traffic is monitored to detect unusual or unauthorized activities or conditions.