Controls
Operations and Response
STATUS
CONTROL
Build Security Incident Response Process
The organization has a process for responding to and recovering systems from security incidents, including activation, recovery, and reconfiguration of critical controls and resources.
Internal Security Assessment
The organization regularly inspects and assesses internal systems, account permissions, and current security measures. Evaluations may be performed internally or through a security company.
Implement Firewall
Firewalls are activated at network, server, and application levels.
Host-based Intrusion Detection System (HIDS) implementation
Servers are equipped with software to monitor and detect anomalies/intrusions.
Collect Data Leak Information
The organization monitors and updates early information on sensitive data and employee/customer accounts potentially leaked online.
Deploy Antivirus Software
Antivirus software is installed and updated regularly on all employee computers and servers.
Network Intrusion Detection System (NIDS) implementation
Internal and production networks are equipped with software to monitor and detect anomalies/intrusions.