Organization's data systems and network must be monitored to detect abnormal use. When anomalities are detected, the organization must take the necessary measures to assess the possibility of security incident.
The monitoring should utilize tools that enable real-time or regular monitoring, taking into account the organization's requirements. Monitoring practices should be able to manage large amounts of data, adapt to changing threat environment, and send alerts immediately when necessary.
Inclusion of the following sources in the monitoring system should be considered:
- outbound and inbound network and data system traffic
li>
- access to critical data systems, servers, network devices and the monitoring system itself
- critical system and network configuration files
- logs from security tools (e.g. antivirus, IDS, IPS, network filters, firewalls)
Organization must also establish procedures for identifying and correcting "false positive" results, including tuning monitoring software for more accurate anomaly detection.