Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
MIL1 requirements
a. Periodic reviews of log data or other cybersecurity monitoring activities are performed, at least in an ad hoc manner
b. Data and alerts from network and host monitoring infrastructure assets are periodically reviewed, at least in an ad hoc manner
MIL2 requirements
c. Monitoring and analysis requirements are established and maintained for the function and address timely review of event data
d. Indicators of anomalous activity are established and maintained based on system logs, data flows, network baselines, cybersecurity events, and architecture and are monitored across the IT and OT environments
e. Alarms and alerts are configured and maintained to support the identification of cybersecurity events
f. Monitoring activities are aligned with the threat profile (THREAT-2e)
MIL3 requirements
g. More rigorous monitoring is performed for higher priority assets
h. Risk analysis information (RISK-3d) is used to identify indicators of anomalous activity
i. Indicators of anomalous activity are evaluated and updated periodically and according to defined triggers, such as system changes and external events
MIL1 requirements
a. Periodic reviews of log data or other cybersecurity monitoring activities are performed, at least in an ad hoc manner
b. Data and alerts from network and host monitoring infrastructure assets are periodically reviewed, at least in an ad hoc manner
MIL2 requirements
c. Monitoring and analysis requirements are established and maintained for the function and address timely review of event data
d. Indicators of anomalous activity are established and maintained based on system logs, data flows, network baselines, cybersecurity events, and architecture and are monitored across the IT and OT environments
e. Alarms and alerts are configured and maintained to support the identification of cybersecurity events
f. Monitoring activities are aligned with the threat profile (THREAT-2e)
MIL3 requirements
g. More rigorous monitoring is performed for higher priority assets
h. Risk analysis information (RISK-3d) is used to identify indicators of anomalous activity
i. Indicators of anomalous activity are evaluated and updated periodically and according to defined triggers, such as system changes and external events
In Cyberday, requirements and controls are mapped to universal tasks. A set of tasks in the same topic create a Policy, such as this one.
In Cyberday, requirements and controls are mapped to universal tasks. Each requirement is fulfilled with one or multiple tasks.
When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.