The organization's business critical systems shall be monitored for unauthorized personnel access, connections, devices, access points, and software.
Unauthorized configuration changes to organization's systems shall be monitored and addressed with the appropriate mitigation actions.