Defines the techniques and methods to be used to identify unauthorized use of the system.
No STIG checks reference this CCI.