Under active development Content is continuously updated and improved · Last updated Feb 18, 2026, 2:55 AM UTC

3.14.6Monitor Communications for Attacks Assessment

>Control Description

Determine if: the system is monitored to detect attacks and indicators of potential attacks.; inbound communications traffic is monitored to detect attacks and indicators of potential attacks.; outbound communications traffic is monitored to detect attacks and indicators of potential attacks.

Ask AI

Configure your API key to use AI features.