SI-04 Information System Monitoring Tools And Techniques

System and Information Integrity

Low Moderate High

Description

The organization employs tools and techniques to monitor events on the information system, detect attacks, and provide identification of unauthorized use of the system.

Supplemental Guidance

Information system monitoring capability is achieved through a variety of tools and techniques (e.g., intrusion detection systems, intrusion prevention systems, malicious code protection software, audit record monitoring software, network monitoring software). Monitoring devices are strategically deployed within the information system (e.g., at selected perimeter locations, near server farms supporting critical applications) to collect essential information. Monitoring devices are also deployed at ad hoc locations within the system to track specific transactions. Additionally, these devices are used to track the impact of security changes to the information system. The granularity of the information collected is determined by the organization based upon its monitoring objectives and the capability of the information system to support such activities. Organizations consult appropriate legal counsel with regard to all information system monitoring activities. Organizations heighten the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations, organizational assets, or individuals based on law enforcement information, intelligence information, or other credible sources of information. NIST Special Publication 800-61 provides guidance on detecting attacks through various types of security technologies. NIST Special Publication 800-83 provides guidance on detecting malware-based attacks through malicious code protection software. NIST Special Publication 800-92 provides guidance on monitoring and analyzing computer security event logs. NIST Special Publication 800-94 provides guidance on intrusion detection and prevention. Related security control: AC-08.

Changes from Rev 4

Title changed from 'Information System Monitoring' Control text replaces 'Protect information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion' with 'Analyze detected events and anomalies' and replaces 'Heightens' with 'Adjust' Discussion expanded with references to other controls

MITRE ATT&CK Techniques (375)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Reconnaissance 4 Initial Access 15 Execution 34 Persistence 79 Privilege Escalation 72 Defense Evasion 131 Credential Access 51 Discovery 9 Lateral Movement 18 Collection 25 Command & Control 36 Exfiltration 14 Impact 19
Show all 375 techniques grouped by tactic

Execution

Persistence

T1037 T1053 T1078 T1098 T1133 T1136 T1137 T1176 T1197 T1205 T1505 T1525 T1543 T1556 T1574 T1653 T1037.002 T1037.003 T1037.004 T1037.005 T1053.002 T1053.003 T1053.005 T1053.006 T1078.001 T1078.002 T1078.003 T1078.004 T1098.001 T1098.002 T1098.003 T1098.004 T1098.007 T1136.001 T1136.002 T1136.003 T1137.001 T1205.001 T1205.002 T1505.002 T1505.003 T1505.004 T1505.005 T1542.004 T1542.005 T1543.002 T1546.002 T1546.003 T1546.004 T1546.006 T1546.008 T1546.013 T1546.014 T1546.016 T1547.002 T1547.003 T1547.004 T1547.005 T1547.006 T1547.007 T1547.008 T1547.009 T1547.012 T1547.013 T1556.001 T1556.002 T1556.003 T1556.004 T1556.008 T1556.009 T1574.001 T1574.004 T1574.005 T1574.007 T1574.008 T1574.009 T1574.010 T1574.013 T1574.014

Privilege Escalation

T1037 T1053 T1055 T1068 T1078 T1098 T1484 T1543 T1548 T1574 T1611 T1037.002 T1037.003 T1037.004 T1037.005 T1053.002 T1053.003 T1053.005 T1053.006 T1055.001 T1055.002 T1055.003 T1055.004 T1055.005 T1055.008 T1055.009 T1055.011 T1055.012 T1055.013 T1055.014 T1078.001 T1078.002 T1078.003 T1078.004 T1098.001 T1098.002 T1098.003 T1098.004 T1098.007 T1543.002 T1546.002 T1546.003 T1546.004 T1546.006 T1546.008 T1546.013 T1546.014 T1546.016 T1547.002 T1547.003 T1547.004 T1547.005 T1547.006 T1547.007 T1547.008 T1547.009 T1547.012 T1547.013 T1548.001 T1548.002 T1548.003 T1548.004 T1548.006 T1574.001 T1574.004 T1574.005 T1574.007 T1574.008 T1574.009 T1574.010 T1574.013 T1574.014

Defense Evasion

T1027 T1036 T1055 T1070 T1078 T1127 T1197 T1205 T1211 T1216 T1218 T1220 T1221 T1222 T1484 T1548 T1553 T1556 T1562 T1574 T1578 T1599 T1601 T1610 T1612 T1622 T1647 T1027.002 T1027.007 T1027.008 T1027.009 T1027.010 T1027.011 T1027.012 T1036.001 T1036.003 T1036.005 T1036.007 T1036.008 T1036.010 T1055.001 T1055.002 T1055.003 T1055.004 T1055.005 T1055.008 T1055.009 T1055.011 T1055.012 T1055.013 T1055.014 T1070.001 T1070.002 T1070.003 T1070.007 T1070.008 T1070.009 T1070.010 T1078.001 T1078.002 T1078.003 T1078.004 T1127.001 T1127.002 T1205.001 T1205.002 T1216.001 T1218.001 T1218.002 T1218.003 T1218.004 T1218.005 T1218.008 T1218.009 T1218.010 T1218.011 T1218.012 T1218.013 T1218.014 T1218.015 T1222.001 T1222.002 T1542.004 T1542.005 T1548.001 T1548.002 T1548.003 T1548.004 T1548.006 T1550.001 T1550.003 T1553.001 T1553.003 T1553.004 T1553.005 T1556.001 T1556.002 T1556.003 T1556.004 T1556.008 T1556.009 T1562.001 T1562.002 T1562.003 T1562.004 T1562.006 T1562.010 T1562.011 T1562.012 T1564.002 T1564.004 T1564.006 T1564.007 T1564.008 T1564.009 T1564.010 T1574.001 T1574.004 T1574.005 T1574.007 T1574.008 T1574.009 T1574.010 T1574.013 T1574.014 T1578.001 T1578.002 T1578.003 T1599.001 T1601.001 T1601.002

Credential Access

T1003 T1040 T1110 T1111 T1187 T1212 T1528 T1539 T1552 T1555 T1556 T1557 T1558 T1003.001 T1003.002 T1003.003 T1003.004 T1003.005 T1003.006 T1003.007 T1003.008 T1056.002 T1110.001 T1110.002 T1110.003 T1110.004 T1552.001 T1552.002 T1552.003 T1552.004 T1552.005 T1552.006 T1552.008 T1555.001 T1555.002 T1555.004 T1555.005 T1556.001 T1556.002 T1556.003 T1556.004 T1556.008 T1556.009 T1557.001 T1557.002 T1557.003 T1557.004 T1558.002 T1558.003 T1558.004 T1558.005

Collection

Command & Control

Compliance Mappings

ISO 27001:2022

9.1A.8.12A.8.16

ISO 27002:2022

5.258.128.16

COBIT 2019

DSS01DSS05MEA01

CIS Controls v8

CIS 1.4CIS 10CIS 10.7CIS 13CIS 13.1CIS 13.10CIS 13.11CIS 13.2CIS 13.3CIS 13.6CIS 13.7CIS 13.8CIS 3.13CIS 8.7CIS 8.9

NIST CSF 2.0

DE.AE-02DE.AE-03DE.AE-04DE.AE-06DE.CM-01DE.CM-03DE.CM-06DE.CM-09ID.IM-03RS.AN-03

SOC 2 TSC

CC6.6CC6.6-POF2CC7.2CC7.2-POF1CC7.3

PCI DSS v4.0.1

10.410.711.211.511.6

CSA CCM v4

IVS-09LOG-03LOG-05LOG-13UEM-11

CSA AICM v1

AIS-12I&S-09LOG-03LOG-05LOG-13LOG-14MDS-05TVM-11TVM-13UEM-11

FINOS CCC

CCC-C08

ISO 42001:2023

A.6.2.6

IEC 62443

3-3 SR 6.2

PRA Operational Resilience

SS2/21-7.1

MAS TRM

1112

APRA CPS 234

Para 22-23

BSI IT-Grundschutz

DER.1

ANSSI

Hygiene.29Hygiene.39SecNumCloud.13.7

FINMA Circular 2023/1

IV.C(66)IV.C(67)IV.C(68)IV.C(69)

OSFI B-13

B-13.3.3

EU GDPR

Art.32(1)(b)Art.32(1)(d)

EU DORA

Art.10(1)Art.10(2)

BIO2

5.258.128.16

RBI CSF

Annex1.4Annex1.13Annex1.16Annex1.20

FISC Security Guidelines

FISC.O2FISC.O4

LGPD + BCB 4893

BCB.Art.3BCB.Art.6BCB.Art.7BCB.PIXLGPD.Art.46

HKMA TM-E-1

TME1.10.1TME1.11.3TME1.5.2TME1.7.3TME1.7.5

MLPS 2.0

8.1.10.58.1.3.38.1.4.48.1.4.58.1.5.48.28.38.48.5

DNB Good Practice

DNB.16.1DNB.19.1

EU CRA

CRA.I.2dCRA.I.2iCRA.I.2l

SWIFT CSCF

SWIFT.2.9SWIFT.6.1SWIFT.6.4SWIFT.6.5A

SAMA CSF

3.33.6

NCA ECC

2-122-42-55-1

UAE IA

T11T7

CBB TM

TM-12TM-13TM-8

Qatar NIA

IMOS

CBUAE

CR-3CR-7

CBE CSF

CD-1CTO-6CTO-7CTO-8

SA JS2

JS2-7.2JS2-7.3JS2-7.6JS2-8.4

CBN CSF

Part2.2Part3.3Part3.5Part4

BoG CISD

CISD-VICISD-VII

POPIA

s19

BoM CTRM

3.24.14.25.1

IOSCO Cyber Resilience

DET-1DET-2DET-3DET-4

BCBS 239

Principle 10

CPMI-IOSCO PFMI

CG.DEPFMI.P17

FFIEC IS

II.C.12II.C.16II.C.9II.DIII.AIII.BIII.C

NYDFS 500

500.14500.2500.6

HIPAA Security Rule

§164.308(a)(1)(ii)(D)§164.308(a)(5)(ii)(B)§164.308(a)(5)(ii)(C)§164.308(a)(6)(ii)

ECB CROE

CROE.2.3.5CROE.2.4

EBA ICT Guidelines

3.4.53.5(c)3.8(c)

SEBI CSCRF

DE.CMDE.DPPR.NSRS.ANSOC

BOT Cyber Resilience

Ch2.6Ch3.1Ch8.2

CMMC 2.0

AUSI

NERC CIP

CIP-007-6CIP-015-1

10 CFR 73.54

RG5.71-A-AURG5.71-A-SI

TSA Pipeline SD

SD-2 Sec C

FERC CIP Orders

Order 881

DOE C2M2 v2.1

SITUATION

API 1164

Sec 9

AWIA

AWWA Sec 4AWWA Sec 5

IAEA NSS 17-T

Sec 5.5

PCI PTS v6

IJL

CBEST

CBEST.5

TIBER-EU

TIBER.BT

Common Criteria

CC Part 2 — FAU

ISAE 3402

Clause 4

Solvency II

EIOPA-ICT-4.9

Lloyd's Minimum Standards

MS2.1MS8.10MS8.12MS8.5

NAIC Insurance Data Security

44-audit4-monitoring4B5

PRA SS1/23

P5.2P5.3

FCA SYSC 13

SYSC 13.7.5

HITRUST CSF v11

09.c09.e09.g11.a11.c

FDA Cybersecurity Guidance

MON-3PU-3SA-5

ISO 27799

12.216.2

NHS DSPT

NDG-9.3NDG-9.5NDG-9.9

OWASP MASVS v2.1

MASVS-RESILIENCE-4

CCSS v9.0

1.02.82.04.22.04.3

MiCA

Art.68(1)Art.62(5)Art.62(8)Art.88(1)Art.92(1)

Basel SCO60

SCO60.13SCO60.51SCO60.55SCO60.64SCO60.65SCO60.72

BSSC Standards

NOS-06TIS-05GSP-12

SEC Custody (Digital Assets)

SEC-CD-11SEC-CD-16

ISO 17799 (legacy)

10.6.210.10.110.10.210.10.4

COBIT 4.1 (legacy)

PO2.4DS5.5DS5.10