PGA TRAINING
Is there continuous monitoring for unauthorized access or anomalies in the network?
Guidance
-
Implement continuous monitoring tools and processes to detect anomalies and unauthorized access. Set up alerts and automated responses for suspicious activities