SI.L2-3.14.1[a] – Identify mechanisms to monitor systems for attacks and indicators of potential attacks.
This objective requires your organization to identify the tools, processes, and techniques used to monitor your systems for signs of attacks or suspicious activity, especially to protect Controlled Unclassified Information (CUI).
SI.L2-3.14.3[c] – Determine if flaws and vulnerabilities in organizational systems and applications are identified.
This objective ensures your organization’s vulnerability identification activities are actually happening—meaning you are actively scanning, monitoring, and reviewing your systems and applications for flaws that could compromise Controlled Unclassified Information (CUI).
SI.L2-3.14.6[d] – Determine if updates for vulnerabilities and flaws are installed on organizational systems and applications.
This objective ensures your organization doesn’t just identify systems needing updates—but actually installs patches and updates to address vulnerabilities across systems handling Controlled Unclassified Information (CUI).
SI.L2-3.14.5[c] – Determine if malware protection mechanisms are used.
This objective ensures that your organization’s malware protection tools and strategies are not just documented but actively deployed and functioning across systems that process, store, or transmit Controlled Unclassified Information (CUI).
SI.L2-3.14.1[b] – Examine documentation to confirm mechanisms to monitor systems for attacks and indicators of potential attacks are identified.
This objective ensures your organization has formally documented how you monitor your systems for attacks or suspicious activity—especially for systems that store, process, or transmit Controlled Unclassified Information (CUI).
SI.L2-3.14.2[a] – Identify monitoring mechanisms used to detect unauthorized use of the system.
This objective requires your organization to identify how you monitor for unauthorized use of systems, especially systems that store, process, or transmit Controlled Unclassified Information (CUI). These mechanisms must detect suspicious or policy-violating activities.
SI.L2-3.14.2[b] – Examine documentation to confirm monitoring mechanisms used to detect unauthorized use of the system are identified.
This objective ensures your organization has formally documented the tools and methods you use to detect unauthorized system use, specifically for systems that process, store, or transmit Controlled Unclassified Information (CUI).
SI.L2-3.14.2[d] – Determine if monitoring mechanisms used to detect unauthorized use of the system are enforced.
This objective ensures your organization’s monitoring for unauthorized use is not optional or easily bypassed—it must be technically enforced, resilient, and actively protecting systems that handle Controlled Unclassified Information (CUI).
SI.L2-3.14.6[c] – Determine if systems where updates for vulnerabilities and flaws must be installed are identified.
This objective ensures that your organization is actively maintaining an accurate list of systems requiring vulnerability updates, and that this identification process is real, active, and complete, especially for systems handling Controlled Unclassified Information (CUI).
SI.L2-3.14.2[c] – Determine if monitoring mechanisms are used to detect unauthorized use of the system.
This objective ensures that your organization’s documented monitoring mechanisms are actually deployed and operational, actively detecting unauthorized use of systems that process, store, or transmit Controlled Unclassified Information (CUI).