Under active development Content is continuously updated and improved

CA-7(4)Continuous Monitoring | Risk Monitoring

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Ensure risk monitoring is an integral part of the continuous monitoring strategy that includes the following: (a) Effectiveness monitoring; (b) Compliance monitoring; and (c) Change monitoring.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Risk monitoring is informed by the established organizational risk tolerance. Effectiveness monitoring determines the ongoing effectiveness of the implemented risk response measures. Compliance monitoring verifies that required risk response measures are implemented.

It also verifies that security and privacy requirements are satisfied. Change monitoring identifies changes to organizational systems and environments of operation that may affect security and privacy risk.

>Programmatic Queries

Beta

Related Services

Amazon GuardDuty
AWS Security Hub
Amazon Macie

CLI Commands

Get GuardDuty risk findings
aws guardduty list-findings --detector-id detector-id --finding-criteria '{"Criterion":{"severity":{"Gte":7}}}' --sort-by UpdatedAt
Get Security Hub risk aggregation
aws securityhub describe-hub --query 'HubArn'
List Macie findings for data risk
aws macie2 list-findings --filter-criteria '{"severity":{"eq":["CRITICAL","HIGH"]}}' --sort-order DESC
Create custom insight for risk trends
aws securityhub create-insight --name RiskMonitoring --filters '{"SeverityLabel":[{"Value":"CRITICAL","Comparison":"EQUALS"}]}'

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CA-7(4) (Risk Monitoring)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CA-7(4)?
  • How frequently is the CA-7(4) policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to CA-7(4)?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CA-7(4) requirements.
  • What automated tools, systems, or technologies are deployed to implement CA-7(4)?
  • How is CA-7(4) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CA-7(4) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CA-7(4)?
  • What audit logs, records, reports, or monitoring data validate CA-7(4) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CA-7(4) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CA-7(4) compliance?

Ask AI

Configure your API key to use AI features.