E009—Monitor third-party access
>Control Description
Implement systems to monitor third party access
Application
Optional
Frequency
Every 12 monthsCapabilities
Universal
>Controls & Evidence (1)
Technical Implementation
E009.1
Config: Third-party access monitoringCore - This should include:
- Configuring logging for third-party interactions. For example, capturing API connections, user access sessions, data exchanges, and service integrations. - Capturing access metadata. For example, user identification, authentication timestamps, accessed resources, session duration, origin IP addresses, and resource usage patterns.
Typical evidence: Screenshot of logging system or SIEM configuration showing third-party interactions being monitored with captured metadata - may include cloud logging interface (Google Cloud Logging, AWS CloudWatch, Azure Monitor) showing logged API requests with timestamps/IPs/user agents, access logs capturing authentication events and resource access, or SIEM dashboard displaying third-party connection monitoring with relevant metadata fields.
Location: Engineering Tooling
>Cross-Framework Mappings
NIST AI RMF
Ask AI
Configure your API key to use AI features.