CFM-06—Prohibited Activity Monitoring
>Control Description
Organization information systems are configured to explicitly deny a predefined list of activities.
Theme
Technology
Type
Detective
Policy/Standard
Infrastructure Management Policy>Implementation Guidance
1. Prepare a list of activities that shall be denied on Information Systems, e.g., removable media restriction. 2. Ensure that the denied activities are enforced on the Information systems. 3. Ensure that the logs are being maintained for monitoring. 4. The list shall be reviewed periodically.
>Testing Procedure
1. Validate whether a list is being maintained that has the activities that shall be denied on Information Systems. 2. Inspect the activity logs to validate whether the denied activities are enforced and monitored on the Information systems. 3. Validate whether the periodic review history documentation is present.
>Audit Artifacts
E-CFM-08
E-CFM-09
E-CFM-10
>Framework Mappings
Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.
Ask AI
Configure your API key to use AI features.