Controls
Operations and Threat
STATUS
CONTROL
Data Leak Monitoring
The organization continuously monitors for leaked credentials, sensitive data, and employee/customer account exposures across the internet and dark web.
Intrusion Detection
Network and host-based intrusion detection systems (NIDS/HIDS) are deployed to monitor, detect, and alert on anomalous activity and potential intrusions.
Continuous Monitoring and Logging
Applications and infrastructure are continuously monitored. Security-relevant events are logged, centralized, and retained for at least 12 months for audit and investigation purposes.
Network and Endpoint Protection
Firewalls are configured at network, server, and application layers. Antivirus and anti-malware software is deployed and kept up to date on all endpoints and servers.
Vulnerability Management
Security vulnerabilities are tracked in a centralized platform. Remediation follows defined SLAs based on severity: critical within 48 hours, high within 7 days.