The organisation shall monitor computing hardware, software, runtime environments, and their data to detect potentially adverse events.
The organisation shall monitor computing hardware, software, runtime environments, and their data to detect potentially adverse events.
The organisation shall implement hardware integrity checks to detect unauthorised tampering of critical system hardware. Controls shall be proportionate to the organisation’s risk profile and operational capacity.
The organisation shall implement hardware integrity checks to detect unauthorised tampering of critical system hardware. Controls shall be proportionate to the organisation’s risk profile and operational capacity.
The organisation's incident response plan shall include measures to detect unauthorised tampering with the hardware of critical systems.
The organisation's incident response plan shall include measures to detect unauthorised tampering with the hardware of critical systems.
The organisation shall establish a system to accurately distinguish between legitimate alerts and false positives, ensuring effective detection and removal of malicious code.
The organisation shall establish a system to accurately distinguish between legitimate alerts and false positives, ensuring effective detection and removal of malicious code.