Identify unauthorized use of the system through organization-defined techniques and methods.
No STIG checks reference this CCI.