Leadline Inc.Leadline Inc.
Control Requirements

COM-07: Unauthorized Network Access Monitoring

Implementation of monitoring solution to detect unauthorized network access with automated alerts

Control Description

A monitoring solution has been implemented to detect unauthorized access to the network. Alerts are automatically sent to members of the security team based upon predefined events, and any identified risks are logged within a ticketing system and are investigated and resolved within X business days.

Plain Meaning

This control requires implementing a comprehensive monitoring system that continuously watches for unauthorized access attempts to the company's network. When suspicious or unauthorized access is detected, the system should automatically send alerts to the security team. All detected risks should be logged in a ticketing system for tracking, investigation, and resolution within a specified timeframe.