STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SI-4 (12) — System Monitoring

CCI-001274

Definition

Alert organization-defined personnel or roles using organization-defined automated mechanisms when inappropriate or unusual activities with security or privacy implications.

Parent Control

SI-4 (12)System MonitoringSystem and Information Integrity

Linked STIG Checks (7)

V-255618CAT IIThe A10 Networks ADC must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW CJCSM 6510.01B.A10 Networks ADC NDM Security Technical Implementation GuideV-222668CAT IIThe system must alert an administrator when low resource conditions are encountered.Application Security and Development Security Technical Implementation GuideV-229010CAT IIThe BIG-IP appliance must be configured to use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW with CJCSM 6510.01B.F5 BIG-IP Device Management Security Technical Implementation GuideV-255629CAT IICounterACT must enable Threat Protection notifications to alert security personnel to Cyber events detected by a CounterACT IAW CJCSM 6510.01B.ForeScout CounterACT NDM Security Technical Implementation GuideV-65173CAT IIThe DataPower Gateway must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and in accordance with CJCSM 6510.01B.IBM DataPower Network Device Management Security Technical Implementation GuideV-255769CAT IIThe MQ Appliance network device must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and in association with CJCSM 6510.01B.IBM MQ Appliance v9.0 NDM Security Technical Implementation GuideV-228672CAT IIThe Palo Alto Networks security platform must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW CJCSM 6510.01B.Palo Alto Networks NDM Security Technical Implementation Guide