CMMC 2.0 • LEVEL 2 • SYSTEM & INFORMATION INTEGRITY
SI.L2-3.14.6 — System Monitoring
Monitor the system to detect: Attacks and indicators of potential attacks and Unauthorized connections. Identify unauthorized use of the system. Monitor inbound and outbound communications traffic to detect unusual or unauthorized activities or conditions.
Assessment Objectives
- the system is monitored to detect attacks.
- the system is monitored to detect indicators of potential attacks.
- the system is monitored to detect unauthorized connections.
- unauthorized use of the system is identified.
- inbound communications traffic is monitored to detect unusual or unauthorized activities or conditions.
- outbound communications traffic is monitored to detect unusual or unauthorized activities or conditions.
Practitioner Notes
Practitioner commentary coming soon.