CCC.F09: Monitoring
Description:Provides the ability to continuously observe, track, and analyze
the performance, availability, and health of the service resources or
applications.
Related Threats:
ID | Title | Description |
---|---|---|
CCC.TH09 | Logs or Monitoring Data are Read by Unauthorized Users | Unauthorized access to logs or monitoring data can provide attackers with valuable information about the system's configuration, operations, and security mechanisms. This can be used to identify vulnerabilities, plan attacks, or evade detection. |
CCC.TH10 | Alerts are Intercepted | Malicious actors may exploit event notifications to monitor and intercept information about sensitive operations or access patterns. |