STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SI-4 (4) — System Monitoring

CCI-002661

Definition

Monitor inbound communications traffic per organization-defined frequency for organization-defined unusual or unauthorized activities or conditions.

Parent Control

SI-4 (4)System MonitoringSystem and Information Integrity

Linked STIG Checks (17)

V-76443CAT IIKona Site Defender providing content filtering must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.Akamai KSD Service Impact Level 2 ALG Security Technical Implementation GuideV-205016CAT IIThe ALG providing content filtering must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.Application Layer Gateway Security Requirements GuideV-239890CAT IIThe Cisco ASA must be configured to block inbound traffic containing unauthorized activities or conditions.Cisco ASA IPS Security Technical Implementation GuideV-259868CAT IIThe Mission Owner of the Infrastructure as a Service (IaaS) or Platform as a Service (PaaS) must continuously monitor and protect inbound communications from external systems, other IaaS within the same cloud service environment, or collocated mission applications for unusual or unauthorized activities or conditions.Cloud Computing Mission Owner Network Security Requirements GuideV-237568CAT IIThe DBN-6300 must continuously monitor inbound communications traffic between the application tier and the database tier for unusual/unauthorized activities or conditions at the SQL level.DBN-6300 IDPS Security Technical Implementation GuideV-214515CAT IIThe BIG-IP ASM module must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.F5 BIG-IP Application Security Manager Security Technical Implementation GuideV-215796CAT IIThe BIG-IP Core implementation must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-65289CAT IIThe DataPower Gateway providing content filtering must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.IBM DataPower ALG Security Technical Implementation GuideV-55381CAT IIThe IDPS must continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions.Intrusion Detection and Prevention Systems (IDPS) Security Requirements GuideV-206913CAT IIThe IDPS must continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions.Intrusion Detection and Prevention Systems Security Requirements GuideV-214537CAT IThe Juniper SRX Services Gateway Firewall must continuously monitor all inbound communications traffic for unusual/unauthorized activities or conditions.Juniper SRX Services Gateway ALG Security Technical Implementation GuideV-228868CAT IIThe Palo Alto Networks security platform must continuously monitor inbound communications traffic crossing internal security boundaries.Palo Alto Networks ALG Security Technical Implementation GuideV-207709CAT IIThe Palo Alto Networks security platform must continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions.Palo Alto Networks IDPS Security Technical Implementation GuideV-279203CAT IIThe Edge SWG must control remote access methods.Symantec Edge SWG ALG Security Technical Implementation GuideV-94341CAT IIReverse proxy Symantec ProxySG providing content filtering must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.Symantec ProxySG ALG Security Technical Implementation GuideV-241173CAT IITrend Deep Security must continuously monitor inbound communications traffic for unusual or unauthorized activities or conditions.Trend Micro Deep Security 9.x Security Technical Implementation GuideV-242203CAT IIThe IDPS must continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions.Trend Micro TippingPoint IDPS Security Technical Implementation Guide