System and Information Integrity - Level 2
CMMC SI.2.217 - Identify Unauthorized Use of Systems
Requirement text: SI.2.217: Identify unauthorized use of organizational systems. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 System monitoring includes external and internal monitoring. System monitoring can detect unauthorized use of ...
CMMC SI.2.216 - Monitor Systems Communications Traffic
Requirement text: SI.2.216: Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 System monitoring includes ...
CMMC SI.2.214 - Monitor Security Alert and Respond
Requirement text: SI.2.214: Monitor system security alerts and advisories and take action in response. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 There are many publicly available sources of system security alerts and advisories. The United ...