12.5: Configure Monitoring Systems to Record Network Packets

Configure monitoring systems to record network packets passing through the boundary at each of the organization’s network boundaries.

Asset Type

Security Function

Implementation Groups

Network

Detect

2, 3

Dependencies

  • Sub-control 2.1: Maintain Inventory of Authorized Software

  • Sub-control 12.1: Maintain an Inventory of Network Boundaries

Inputs

  1. List of network monitoring systems

  2. List of network boundaries

Operations

  1. For each network monitoring system:
    1. Retrieve configuration

    2. Check configuration for recording

    3. Enumerate network boundaries covered

Measures

  • M1 = Count of network monitoring systems (from Input 1)

  • M2 = List of misconfigured network monitoring systems

  • M3 = Count of misconfigured network monitoring systems

  • M4 = Count of network boundaries (from Input 2)

  • M5 = List of network boundaries covered by network monitoring systems

  • M6 = Count of network boundaries covered by network monitoring systems

  • M7 = List of network boundaries not covered by network monitoring systems

  • M8 = Count of network boundaries not covered by network monitoring systems

Metrics

Monitoring System Configuration

Metric

Percentage of appropriately configured monitoring systems

Calculation

(M1 - M3) / M1

Network Boundary Coverage

Metric

Percentage of network boundaries not covered by a monitoring system

Calculation

(M4 - M6) / M4