Controls

Operations and Threat

STATUS

CONTROL

Compliant

Data Leak Monitoring

The organization continuously monitors for leaked credentials, sensitive data, and employee/customer account exposures across the internet and dark web.

Compliant

Intrusion Detection

Network and host-based intrusion detection systems (NIDS/HIDS) are deployed to monitor, detect, and alert on anomalous activity and potential intrusions.

Compliant

Continuous Monitoring and Logging

Applications and infrastructure are continuously monitored. Security-relevant events are logged, centralized, and retained for at least 12 months for audit and investigation purposes.

Compliant

Network and Endpoint Protection

Firewalls are configured at network, server, and application layers. Antivirus and anti-malware software is deployed and kept up to date on all endpoints and servers.

Compliant

Vulnerability Management

Security vulnerabilities are tracked in a centralized platform. Remediation follows defined SLAs based on severity: critical within 48 hours, high within 7 days.