data.gift
  • Datasets

http://cyfun.data.gift/data/requirement_DE_CM_03_2

http://cyfun.data.gift/data/requirement_DE_CM_03_2
Concept

  • http://cyfun.data.gift/data/CyFun2025

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_IMPORTANT

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

    • External link
    • Internal link

  • http://cyfun.data.gift/data/subcategory_DE.CM-03

    • External link
    • Internal link

Properties and relations

Direct links from the subject.

Property Value

type

The subject is an instance of a class.

  • External link
  • Internal link

http://cyfun.data.gift/ontology#Requirement

  • External link
  • Internal link

type

The subject is an instance of a class.

  • External link
  • Internal link

Concept

An idea or notion; a unit of thought.

  • External link
  • Internal link

label

A human-readable name for the subject.

  • External link
  • Internal link

DE.CM-03.2: End point and network protection tools that monitor end-user behaviour for danger- ous activity shall be managed.

http://cyfun.data.gift/ontology#requirementId

  • External link
  • Internal link

DE.CM-03.2

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p150

  • External link
  • Internal link

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p101

  • External link
  • Internal link

has broader

Relates a concept to a concept that is more general in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_DE.CM-03

  • External link
  • Internal link

note

A general note, for any purpose.

  • External link
  • Internal link

This control builds on DE.CM-03.1 byshifting the focus from implementation to ongoing management of mon- itoring tools. The goal of this control is to ensure that tools used to monitor user behaviour and detect harmful activity on devices and networks are properly maintained and actively managed. This supports the continued effectiveness of the tools as threats evolve, and ensures that the alerts they produce are accurate, relevant, and helpful for identifying real security risks. To achieve this goal, consider the following: - Tools that monitordevices such as laptops, mobile phones, and servers should be regularlychecked to confirm theyareworking properly, updatedwith the latest threat information, and able to detect newtypes ofattacks. - A central system should be used to collect and analyse logs from different sources. These logs should be complete, up to date, and useful for identifying suspicious activity. - Logs related to system access, such as login attempts or access outside normal hours, should be reviewed regularly. Alerts should be set up to notify security teams of unusual patterns. - Tools that analyse userbehaviourshould be fine-tuned overtime. Securityteams should reviewalerts, adjust detection rules to reduce false alarms, and improve accuracy. - Deception tools, such as fake systems or files designed to attract attackers, should be monitored closely. Alerts from these tools are often early signs of a real attack and should be treated as high priority. - Security teams should regularly assess howwell all monitoring tools are performing, update detection rules, and ensure the tools are integrated with incident response processes. - Roles and responsibilities for monitoring and responding to alerts should be clearly defined. Staff should be trained to use the tools effectively and respond appropriately to incidents.

note

A general note, for any purpose.

  • External link
  • Internal link

This control builds on DE.CM-03.1 byshifting the focus from implementation to ongoing management of mon- itoring tools. The goal of this control is to ensure that tools used to monitor user behaviour and detect harmful activity on devices and networks are properly maintained and actively managed. This supports the continued effectiveness of the tools as threats evolve, and ensures that the alerts they produce are accurate, relevant, and helpful for identifying real security risks. To achieve this goal, consider the following: • Tools that monitordevices such as laptops, mobile phones, and servers should be regularlychecked to confirm theyareworking properly, updatedwith the latest threat information, and able to detect newtypes ofattacks. • A central system should be used to collect and analyse logs from different sources. These logs should be complete, up to date, and useful for identifying suspicious activity. • Logs related to system access, such as login attempts or access outside normal hours, should be reviewed regularly. Alerts should be set up to notify security teams of unusual patterns. • Tools that analyse userbehaviourshould be fine-tuned overtime. Securityteams should reviewalerts, adjust detection rules to reduce false alarms, and improve accuracy. • Deception tools, such as fake systems or files designed to attract attackers, should be monitored closely. Alerts from these tools are often early signs of a real attack and should be treated as high priority. • Security teams should regularly assess howwell all monitoring tools are performing, update detection rules, and ensure the tools are integrated with incident response processes. • Roles and responsibilities for monitoring and responding to alerts should be clearly defined. Staff should be trained to use the tools effectively and respond appropriately to incidents.

note

A general note, for any purpose.

  • External link
  • Internal link

<div><p>This control builds on DE.CM-03.1 byshifting the focus from implementation to ongoing management of mon- itoring tools. The goal of this control is to ensure that tools used to monitor user behaviour and detect harmful activity on devices and networks are properly maintained and actively managed. This supports the continued effectiveness of the tools as threats evolve, and ensures that the alerts they produce are accurate, relevant, and helpful for identifying real security risks. To achieve this goal, consider the following:</p><ul><li>Tools that monitordevices such as laptops, mobile phones, and servers should be regularlychecked to confirm theyareworking properly, updatedwith the latest threat information, and able to detect newtypes ofattacks.</li><li>A central system should be used to collect and analyse logs from different sources. These logs should be complete, up to date, and useful for identifying suspicious activity.</li><li>Logs related to system access, such as login attempts or access outside normal hours, should be reviewed regularly. Alerts should be set up to notify security teams of unusual patterns.</li><li>Tools that analyse userbehaviourshould be fine-tuned overtime. Securityteams should reviewalerts, adjust detection rules to reduce false alarms, and improve accuracy.</li><li>Deception tools, such as fake systems or files designed to attract attackers, should be monitored closely. Alerts from these tools are often early signs of a real attack and should be treated as high priority.</li><li>Security teams should regularly assess howwell all monitoring tools are performing, update detection rules, and ensure the tools are integrated with incident response processes.</li><li>Roles and responsibilities for monitoring and responding to alerts should be clearly defined. Staff should be trained to use the tools effectively and respond appropriately to incidents.</li></ul></div>

note

A general note, for any purpose.

  • External link
  • Internal link

This control builds on DE.CM-03.1 byshifting the focus from implementation to ongoing management of mon- itoring tools. The goal of this control is to ensure that tools used to monitor user behaviour and detect harmful activity on devices and networks are properly maintained and actively managed. This supports the continued effectiveness of the tools as threats evolve, and ensures that the alerts they produce are accurate, relevant, and helpful for identifying real security risks. To achieve this goal, consider the following: - Tools that monitordevices such as laptops, mobile phones, and servers should be regularlychecked to confirm theyareworking properly, updatedwith the latest threat information, and able to detect newtypes ofattacks. - A central system should be used to collect and analyse logs from different sources. These logs should be complete, up to date, and useful for identifying suspicious activity. - Logs related to system access, such as login attempts or access outside normal hours, should be reviewed regularly. Alerts should be set up to notify security teams of unusual patterns. - Tools that analyse userbehaviourshould be fine-tuned overtime. Securityteams should reviewalerts, adjust detection rules to reduce false alarms, and improve accuracy. - Deception tools, such as fake systems or files designed to attract attackers, should be monitored closely. Alerts from these tools are often early signs of a real attack and should be treated as high priority. - Security teams should regularly assess howwell all monitoring tools are performing, update detection rules, and ensure the tools are integrated with incident response processes. - Roles and responsibilities for monitoring and responding to alerts should be clearly defined. Staff should be trained to use the tools effectively and respond appropriately to incidents.

notation

A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme.

  • External link
  • Internal link

DE.CM-03.2

alternative label

skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties.

  • External link
  • Internal link

Endpoint and network protection management

preferred label

A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag.

  • External link
  • Internal link

End point and network protection tools that monitor end-user behaviour for danger- ous activity shall be managed.

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_IMPORTANT

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

  • External link
  • Internal link

http://cyfun.data.gift/ontology#level

  • External link
  • Internal link

http://cyfun.data.gift/data/level_IMPORTANT

  • External link
  • Internal link

triple count

The number of triples associated with the subject.

  • External link
  • Internal link

19

in dataset

Specifies the dataset the subject is part of.

  • External link
  • Internal link

http://data.gift/d/datasets/69E8863AA6CE46D9ACD13109

  • External link
  • Internal link

Resultaten 1 - 21 of 21

References

Inverse links to the subject.

Property Subject

http://cyfun.data.gift/ontology#hasRequirement

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_DE.CM-03

  • External link
  • Internal link

has narrower

Relates a concept to a concept that is more specific in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_DE.CM-03

  • External link
  • Internal link

Resultaten 1 - 1 of 1

© 2024 redpencil.io. All rights reserved.