Controls

Operations and Response

STATUS

CONTROL

Build Security Incident Response Process

The organization has a process for responding to and recovering systems from security incidents, including activation, recovery, and reconfiguration of critical controls and resources.

Internal Security Assessment

The organization regularly inspects and assesses internal systems, account permissions, and current security measures. Evaluations may be performed internally or through a security company.

Implement Firewall

Firewalls are activated at network, server, and application levels.

Host-based Intrusion Detection System (HIDS) implementation

Servers are equipped with software to monitor and detect anomalies/intrusions.

Collect Data Leak Information

The organization monitors and updates early information on sensitive data and employee/customer accounts potentially leaked online.

Deploy Antivirus Software

Antivirus software is installed and updated regularly on all employee computers and servers.

Network Intrusion Detection System (NIDS) implementation

Internal and production networks are equipped with software to monitor and detect anomalies/intrusions.