ID.IM-01.179
Does your organization utilize automated tools or systems to continuously evaluate compliance with your established cybersecurity requirements?
Explanation
Automated compliance monitoring tools can continuously scan systems, networks, and applications to verify adherence to security policies, standards, and regulatory requirements without manual intervention. These solutions can include security information and event management (SIEM) systems, compliance scanning tools, configuration management databases, or custom scripts that regularly check system settings against baselines. Evidence could include screenshots of compliance dashboards showing automated scanning results, reports generated by compliance monitoring tools, documentation of automated alert configurations, or logs showing remediation actions taken based on automated findings.
Implementation Example
Constantly evaluate compliance with selected cybersecurity requirements through automated means
ID: ID.IM-01.179
Context
- Function
- ID: IDENTIFY
- Category
- ID.IM: Improvement
- Sub-Category
- Improvements are identified from evaluations

