Annex A 8.16 - Monitoring Activities

Networks, systems, and applications shall be monitored for anomalous behavior, and appropriate actions taken to evaluate potential information security incidents.

Last updated