STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 7 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SI-4 — System Monitoring

CCI-001255

Definition

Invoke internal monitoring capabilities or deploy monitoring devices strategically within the system to collect organization-determined essential information.

Parent Control

SI-4System MonitoringSystem and Information Integrity

Linked STIG Checks (5)

V-251335CAT IIAn Intrusion Detection and Prevention System (IDPS) sensor must be deployed to monitor all Demilitarized Zone (DMZ) segments housing public servers.Network Infrastructure Policy Security Technical Implementation GuideV-251336CAT IIAn Intrusion Detection and Prevention System (IDPS) sensor must be deployed to monitor the network segment hosting web, application, and database servers.Network Infrastructure Policy Security Technical Implementation GuideV-251337CAT IIAn Intrusion Detection and Prevention System (IDPS) sensor must be deployed to monitor network segments that house network security management servers.Network Infrastructure Policy Security Technical Implementation GuideV-251338CAT IIAn Intrusion Detection and Prevention System (IDPS) must be deployed to monitor all unencrypted traffic entering and leaving the enclave.Network Infrastructure Policy Security Technical Implementation GuideV-73105CAT IIServers hosting SDN controllers must have an HIDS implemented to detect unauthorized changes.SDN Using NV Security Technical Implementation Guide