DE.CM-07

Does your organization implement continuous monitoring to detect unauthorized personnel, connections, devices, and software?

Explanation

Continuous monitoring involves real-time or near real-time surveillance of your environment to identify security anomalies such as unauthorized access attempts, unknown devices connecting to your network, or unapproved software installations. This includes tools like intrusion detection systems (IDS), security information and event management (SIEM) solutions, network monitoring tools, and access control logs that alert security personnel to potential threats. Evidence of fulfillment could include screenshots of monitoring dashboards, alert configuration settings, monitoring system logs, documented procedures for responding to detected anomalies, and reports showing detected and remediated incidents over a recent time period.

Context

Function
DE: DETECT
Category
DE.CM: Continuous Monitoring
Sub-Category
Monitoring for unauthorized personnel, connections, devices, and software is performed

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron