DE.CM-01.272

Does your organization implement network monitoring controls to detect and alert on unauthorized endpoint connections to both wired and wireless networks?

Explanation

Network monitoring for unauthorized endpoints is essential for detecting potential security breaches, rogue devices, and policy violations before they can cause harm. This includes monitoring both wired connections (like unauthorized computers or servers) and wireless connections (like unauthorized mobile devices or access points) that could be used to bypass security controls or exfiltrate data. Evidence could include screenshots of network access control (NAC) systems, logs from network monitoring tools showing detection of unauthorized devices, documentation of alerting procedures when unauthorized connections are detected, or network diagrams showing placement of monitoring solutions.

Implementation Example

Monitor wired and wireless networks for connections from unauthorized endpoints

ID: DE.CM-01.272

Context

Function
DE: DETECT
Category
DE.CM: Continuous Monitoring
Sub-Category
Networks and network services are monitored to find potentially adverse events

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron