SI.2.216 Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.

CMMC Practice SI.2.216: Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.

Links to Publicly Available Resources

CMMC CLARIFICATION (Ref CMMC – Appendix B)

Organizations should leverage their monitoring systems to look for indicators of attacks. Think of indicators of attack as a series of actions that an adversary conducts in advance of an attack. Indicators of attack concern the steps involved and the intent of the adversary.

Indicators of attacks on organizational systems may include:

  • internal traffic that indicates the presence of malicious code;
  • malicious code detected during non-business hours;
  • the unauthorized data leaving the organization; and
  • communicating to external information systems.

To detect attacks and indicators of attacks with success, deploy monitoring devices. Place these devices within the systems at strategic points to collect essential information. Strategic points include internal and external system boundaries. The organization should monitor both inbound traffic and outbound traffic.