Control: ism-0120; Revision: 5; Updated: May-20; Applicability: ALL; Essential Eight: N/A
Cyber security personnel have access to sufficient data sources and tools to ensure that systems can be monitored for key indicators of compromise.
Cyber security personnel have access to sufficient data sources and tools to ensure that systems can be monitored for key indicators of compromise.