STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← SI-4 — System Monitoring

CCI-001255

Definition

Invoke internal monitoring capabilities or deploy monitoring devices strategically within the system to collect organization-determined essential information.

Parent Control

SI-4System MonitoringSystem and Information Integrity

Linked STIG Checks (5)

V-251335CAT IIAn Intrusion Detection and Prevention System (IDPS) sensor must be deployed to monitor all Demilitarized Zone (DMZ) segments housing public servers.Network Infrastructure Policy Security Technical Implementation GuideV-251336CAT IIAn Intrusion Detection and Prevention System (IDPS) sensor must be deployed to monitor the network segment hosting web, application, and database servers.Network Infrastructure Policy Security Technical Implementation GuideV-251337CAT IIAn Intrusion Detection and Prevention System (IDPS) sensor must be deployed to monitor network segments that house network security management servers.Network Infrastructure Policy Security Technical Implementation GuideV-251338CAT IIAn Intrusion Detection and Prevention System (IDPS) must be deployed to monitor all unencrypted traffic entering and leaving the enclave.Network Infrastructure Policy Security Technical Implementation GuideV-73105CAT IIServers hosting SDN controllers must have an HIDS implemented to detect unauthorized changes.SDN Using NV Security Technical Implementation Guide