DE.CM-03.281

Does your organization actively monitor logs from logical access control systems to identify unusual access patterns and failed access attempts?

Explanation

Monitoring access control logs helps detect potential security incidents such as unauthorized access attempts, credential theft, or insider threats. By analyzing patterns in authentication logs, organizations can identify suspicious activities like login attempts outside business hours, multiple failed logins, or access from unusual locations. Evidence could include screenshots of log monitoring dashboards, alert configurations from a SIEM system, documented procedures for log review, or sample reports showing identified anomalies and corresponding incident response actions.

Implementation Example

Monitor logs from logical access control systems to find unusual access patterns and failed access attempts

ID: DE.CM-03.281

Context

Function
DE: DETECT
Category
DE.CM: Continuous Monitoring
Sub-Category
Personnel activity and technology usage are monitored to find potentially adverse events

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron