CCC.F09: Monitoring
Description:Provides the ability to continuously observe, track, and analyze
the performance, availability, and health of the service resources or
applications.
Related Threats:
ID | Title | Description |
---|---|---|
CCC.TH09 | Logs or Monitoring Data are Read by Unauthorized Users | Unauthorized access to logs or monitoring data may expose valuable information about the system's configuration, operations, and security mechanisms. This could allow for the identification of vulnerabilities, enable the planning of attacks, or hinder the detection of ongoing incidents. |
CCC.TH10 | Alerts are Intercepted | Event notifications may be intercepted due to misconfigurations, inadequate security measures, or unauthorized access. This could expose information about sensitive operations or access patterns, potentially impacting system security and integrity. |
CCC.TH16 | Logging and Monitoring are Disabled | Logging and monitoring may be disabled, potentially hindering the detection of security events and reducing visibility into system activities. This condition can impact the organization's ability to investigate incidents and maintain operational integrity. |