MON-01.9 ยท Proxy Logging

Control Description

Mechanisms exist to log all Internet-bound requests, in order to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.

Control Question
Assessment question for control validation

Does the organization log all Internet-bound requests, in order to identify prohibited activities and assist incident handlers with identifying potentially compromised systems?

Control Weighting
8
Validation Cadence
Annual
NIST CSF Function
Detect
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 3 - Tactical
Core Control Designations
Special designations and baseline inclusions
MAD: MON-01.9