CAF C1
Security Monitoring
On the basis that cyber-attacks are inevitable, there should be adequate knowledge, resources, and investment in tools to ensure effective 24 / 7 threat detection and vulnerability management of critical systems. This should be backed up with current threat intelligence, systems, processes, and controls that ensure security events are proactively identified, prioritised, and resolved. These methods and systems need to be secure, with the service desk and resolver teams appropriately vetted, their access to critical systems authenticated, and the use of sensitive data tightly controlled.