SI-04 System Monitoring
a. Monitor the system to detect:
1. Attacks and indicators of potential attacks in accordance with the following monitoring objectives: si-04_odp.01 ; and
2. Unauthorized local, network, and remote connections;
b. Identify unauthorized use of the system through the following techniques and methods: si-04_odp.02;
c. Invoke internal monitoring capabilities or deploy monitoring devices:
1. Strategically within the system to collect organization-determined essential information; and
2. At ad hoc locations within the system to track specific types of transactions of interest to the organization;
d. Analyze detected events and anomalies;
e. Adjust the level of system monitoring activity when there is a change in risk to organizational operations and assets, individuals, other organizations, or the Nation;
f. Obtain legal opinion regarding system monitoring activities; and
g. Provide si-04_odp.03 to si-04_odp.04 si-04_odp.05.
Parameter ID | Definition |
---|---|
si-04_odp.01 | monitoring objectives |
si-04_odp.02 | techniques and methods |
si-04_odp.03 | system monitoring information |
si-04_odp.04 | personnel or roles |
si-04_odp.05 |
Selection (one-or-more):
|
si-04_odp.06 | frequency |
Baselines
- L
- M
- H
- P
Guidance
System monitoring includes external and internal monitoring. External monitoring includes the observation of events occurring at external interfaces to the system. Internal monitoring includes the observation of events occurring within the system. Organizations monitor systems by observing audit activities in real time or by observing other system aspects such as access patterns, characteristics of access, and other actions. The monitoring objectives guide and inform the determination of the events. System monitoring capabilities are achieved through a variety of tools and techniques, including intrusion detection and prevention systems, malicious code protection software, scanning tools, audit record monitoring software, and network monitoring software.
Depending on the security architecture, the distribution and configuration of monitoring devices may impact throughput at key internal and external boundaries as well as at other locations across a network due to the introduction of network throughput latency. If throughput management is needed, such devices are strategically located and deployed as part of an established organization-wide security architecture. Strategic locations for monitoring devices include selected perimeter locations and near key servers and server farms that support critical applications. Monitoring devices are typically employed at the managed interfaces associated with controls SC-7 and AC-17 . The information collected is a function of the organizational monitoring objectives and the capability of systems to support such objectives. Specific types of transactions of interest include Hypertext Transfer Protocol (HTTP) traffic that bypasses HTTP proxies. System monitoring is an integral part of organizational continuous monitoring and incident response programs, and output from system monitoring serves as input to those programs. System monitoring requirements, including the need for specific types of system monitoring, may be referenced in other controls (e.g., [AC-2g](#ac-2_smt.g), AC-2(7), [AC-2(12)(a)](#ac-2.12_smt.a), AC-17(1), AU-13, AU-13(1), AU-13(2), [CM-3f](#cm-3_smt.f), [CM-6d](#cm-6_smt.d), [MA-3a](#ma-3_smt.a), [MA-4a](#ma-4_smt.a), [SC-5(3)(b)](#sc-5.3_smt.b), [SC-7a](#sc-7_smt.a), [SC-7(24)(b)](#sc-7.24_smt.b), [SC-18b](#sc-18_smt.b), [SC-43b](#sc-43_smt.b) ). Adjustments to levels of system monitoring are based on law enforcement information, intelligence information, or other sources of information. The legality of system monitoring activities is based on applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
References 7
- OMB A-130 Office of Management and Budget Memorandum Circular A-130, *Managing Information as a Strategic Resource* , July 2016.
- FIPS 140-3 National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3.
- SP 800-61 Cichonski PR, Millar T, Grance T, Scarfone KA (2012) Computer Security Incident Handling Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-61, Rev. 2.
- SP 800-83 Souppaya MP, Scarfone KA (2013) Guide to Malware Incident Prevention and Handling for Desktops and Laptops. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-83, Rev. 1.
- SP 800-92 Kent K, Souppaya MP (2006) Guide to Computer Security Log Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-92.
- SP 800-94 Scarfone KA, Mell PM (2007) Guide to Intrusion Detection and Prevention Systems (IDPS). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-94.
- SP 800-137 Dempsey KL, Chawla NS, Johnson LA, Johnston R, Jones AC, Orebaugh AD, Scholl MA, Stine KM (2011) Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-137.
Control Enhancements 25
- SI-04(01) System-wide Intrusion Detection System L M H P
- SI-04(02) Automated Tools and Mechanisms for Real-time Analysis L M H P
- SI-04(03) Automated Tool and Mechanism Integration L M H P
- SI-04(04) Inbound and Outbound Communications Traffic L M H P
- SI-04(05) System-generated Alerts L M H P
- SI-04(06) Restrict Non-privileged Users
- SI-04(07) Automated Response to Suspicious Events L M H P
- SI-04(08) Protection of Monitoring Information
- SI-04(09) Testing of Monitoring Tools and Mechanisms L M H P
- SI-04(10) Visibility of Encrypted Communications L M H P
- SI-04(11) Analyze Communications Traffic Anomalies L M H P
- SI-04(12) Automated Organization-generated Alerts L M H P
- SI-04(13) Analyze Traffic and Event Patterns L M H P
- SI-04(14) Wireless Intrusion Detection L M H P
- SI-04(15) Wireless to Wireline Communications L M H P
- SI-04(16) Correlate Monitoring Information L M H P
- SI-04(17) Integrated Situational Awareness L M H P
- SI-04(18) Analyze Traffic and Covert Exfiltration L M H P
- SI-04(19) Risk for Individuals L M H P
- SI-04(20) Privileged Users L M H P
- SI-04(21) Probationary Periods L M H P
- SI-04(22) Unauthorized Network Services L M H P
- SI-04(23) Host-based Devices L M H P
- SI-04(24) Indicators of Compromise L M H P
- SI-04(25) Optimize Network Traffic Analysis L M H P
Related controls 39
- AC-02 Account Management L M H P
- AC-03 Access Enforcement L M H P
- AC-04 Information Flow Enforcement L M H P
- AC-08 System Use Notification L M H P
- AC-17 Remote Access L M H P
- AU-02 Event Logging L M H P
- AU-06 Audit Record Review, Analysis, and Reporting L M H P
- AU-07 Audit Record Reduction and Report Generation L M H P
- AU-09 Protection of Audit Information L M H P
- AU-12 Audit Record Generation L M H P
- AU-13 Monitoring for Information Disclosure L M H P
- AU-14 Session Audit L M H P
- CA-07 Continuous Monitoring L M H P
- CM-03 Configuration Change Control L M H P
- CM-06 Configuration Settings L M H P
- CM-08 System Component Inventory L M H P
- CM-11 User-installed Software L M H P
- IA-10 Adaptive Authentication L M H P
- IR-04 Incident Handling L M H P
- MA-03 Maintenance Tools L M H P
- MA-04 Nonlocal Maintenance L M H P
- PL-09 Central Management L M H P
- PM-12 Insider Threat Program L M H P
- RA-05 Vulnerability Monitoring and Scanning L M H P
- RA-10 Threat Hunting L M H P
- SC-05 Denial-of-service Protection L M H P
- SC-07 Boundary Protection L M H P
- SC-18 Mobile Code L M H P
- SC-26 Decoys L M H P
- SC-31 Covert Channel Analysis L M H P
- SC-35 External Malicious Code Identification L M H P
- SC-36 Distributed Processing and Storage L M H P
- SC-37 Out-of-band Channels L M H P
- SC-43 Usage Restrictions L M H P
- SI-03 Malicious Code Protection L M H P
- SI-06 Security and Privacy Function Verification L M H P
- SI-07 Software, Firmware, and Information Integrity L M H P
- SR-09 Tamper Resistance and Detection L M H P
- SR-10 Inspection of Systems or Components L M H P