DE.CM-1: The network is monitored to detect potential cybersecurity events.

Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.

Firewalls shall be installed and operated on the network boundaries and completed with firewall protection on the endpoints.
Guidance
- Endpoints include desktops, laptops, servers...
- Consider, where feasible, including smart phones and other networked devices when installing and
operating firewalls.
- Consider limiting the number of interconnection gateways to the Internet.

The organization shall monitor and identify unauthorized use of its business-critical systems
through the detection of unauthorized local connections, network connections and remote connections.
Guidance
- Monitoring of network communications should happen at the external boundary of the
organization's business critical systems and at key internal boundaries within the systems.
- When hosting internet facing applications the implementation of a web application firewall (WAF)
should be considered.

The organization shall conduct ongoing security status monitoring of its network to detect
defined information/cybersecurity events and indicators of potential information/cybersecurity events.
Guidance
Security status monitoring should include:
- The generation of system alerts when indications of compromise or potential compromise occur.
- Detection and reporting of atypical usage of organization's critical systems.
- The establishment of audit records for defined information/cybersecurity events.
- Boosting system monitoring activity whenever there is an indication of increased risk.
- Physical environment, personnel, and service provider.

The physical environment of the facility shall be monitored for potential
information/cybersecurity events.

This requirement is part of the framework:  
CyberFundamentals (Belgium)
Best practices
How to implement:
DE.CM-1: The network is monitored to detect potential cybersecurity events.
This policy on
DE.CM-1: The network is monitored to detect potential cybersecurity events.
provides a set concrete tasks you can complete to secure this topic. Follow these best practices to ensure compliance and strengthen your overall security posture.

Firewalls shall be installed and operated on the network boundaries and completed with firewall protection on the endpoints.
Guidance
- Endpoints include desktops, laptops, servers...
- Consider, where feasible, including smart phones and other networked devices when installing and
operating firewalls.
- Consider limiting the number of interconnection gateways to the Internet.

The organization shall monitor and identify unauthorized use of its business-critical systems
through the detection of unauthorized local connections, network connections and remote connections.
Guidance
- Monitoring of network communications should happen at the external boundary of the
organization's business critical systems and at key internal boundaries within the systems.
- When hosting internet facing applications the implementation of a web application firewall (WAF)
should be considered.

The organization shall conduct ongoing security status monitoring of its network to detect
defined information/cybersecurity events and indicators of potential information/cybersecurity events.
Guidance
Security status monitoring should include:
- The generation of system alerts when indications of compromise or potential compromise occur.
- Detection and reporting of atypical usage of organization's critical systems.
- The establishment of audit records for defined information/cybersecurity events.
- Boosting system monitoring activity whenever there is an indication of increased risk.
- Physical environment, personnel, and service provider.

The physical environment of the facility shall be monitored for potential
information/cybersecurity events.

Read below what concrete actions you can take to improve this ->
Frameworks that include requirements for this topic:
No items found.

How to improve security around this topic

In Cyberday, requirements and controls are mapped to universal tasks. A set of tasks in the same topic create a Policy, such as this one.

Here's a list of tasks that help you improve your information and cyber security related to
DE.CM-1: The network is monitored to detect potential cybersecurity events.
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
No other tasks found.

How to comply with this requirement

In Cyberday, requirements and controls are mapped to universal tasks. Each requirement is fulfilled with one or multiple tasks.

Here's a list of tasks that help you comply with the requirement
DE.CM-1: The network is monitored to detect potential cybersecurity events.
of the framework  
CyberFundamentals (Belgium)
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
Network usage log and process for detecting inappropriate network traffic
Critical
High
Normal
Low
28
requirements
Technical cyber security
Network security

Network usage log and process for detecting inappropriate network traffic

This task helps you comply with the following requirements

Defined security arrangements for providing critical network equipment
Critical
High
Normal
Low
Determining the responsibility of network devices
Critical
High
Normal
Low
Firewall administration policies
Critical
High
Normal
Low
3
requirements
Technical cyber security
Network security

Firewall administration policies

This task helps you comply with the following requirements

Monitoring the use of the network and information systems to identify anomalies
Critical
High
Normal
Low

The ISMS component hierachy

When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.

Framework

Sets the overall compliance standard or regulation your organization needs to follow.

Requirements

Break down the framework into specific obligations that must be met.

Tasks

Concrete actions and activities your team carries out to satisfy each requirement.

Policies

Documented rules and practices that are created and maintained as a result of completing tasks.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.