STIGhub
STIGs
RMF Controls
Compare
← All Controls
SI-4 (4)
System and Information Integrity
Rev 3
System Monitoring
CCI Identifiers (9)
CCI-001262
The information system monitors inbound and outbound communications for unusual or unauthorized activities or conditions.
CCI-002659
Defines the frequency on which it will monitor inbound communications for unusual or unauthorized activities or conditions.
CCI-002660
Defines the frequency on which it will monitor outbound communications for unusual or unauthorized activities or conditions.
CCI-002661
Monitor inbound communications traffic per organization-defined frequency for organization-defined unusual or unauthorized activities or conditions.
CCI-002662
Monitor outbound communications traffic per organization-defined frequency for organization-defined unusual or unauthorized activities or conditions.
CCI-004971
Determine criteria for unusual or unauthorized activities or conditions for inbound communications traffic.
CCI-004972
Determine criteria for unusual or unauthorized activities or conditions for outbound communications traffic.
CCI-004973
Defines the unusual or unauthorized activities or conditions that will be monitored for inbound communications traffic.
CCI-004974
Defines the unusual or unauthorized activities or conditions that will be monitored for outbound communications traffic.
Linked STIG Checks (28)
Across 17 STIGs. Click to expand.
▶
Akamai KSD Service Impact Level 2 ALG Security Technical Implementation Guide
1 check
▶
Application Layer Gateway Security Requirements Guide
2 checks
▶
Cisco ASA IPS Security Technical Implementation Guide
2 checks
▶
Cloud Computing Mission Owner Network Security Requirements Guide
2 checks
▶
DBN-6300 IDPS Security Technical Implementation Guide
1 check
▶
F5 BIG-IP Application Security Manager Security Technical Implementation Guide
1 check
▶
F5 BIG-IP Local Traffic Manager Security Technical Implementation Guide
1 check
▶
IBM DataPower ALG Security Technical Implementation Guide
2 checks
▶
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide
2 checks
▶
Intrusion Detection and Prevention Systems Security Requirements Guide
2 checks
▶
Juniper SRX Services Gateway ALG Security Technical Implementation Guide
2 checks
▶
Palo Alto Networks ALG Security Technical Implementation Guide
2 checks
▶
Palo Alto Networks IDPS Security Technical Implementation Guide
2 checks
▶
Symantec Edge SWG ALG Security Technical Implementation Guide
1 check
▶
Symantec ProxySG ALG Security Technical Implementation Guide
2 checks
▶
Trend Micro Deep Security 9.x Security Technical Implementation Guide
1 check
▶
Trend Micro TippingPoint IDPS Security Technical Implementation Guide
2 checks