AC-2(12)
AC-2(12): Account Monitoring / Atypical Usage
The organization:
- (a): Monitors information system accounts for [one of ]; and
- (b): Reports atypical usage of information system accounts to [one of ].
Supplemental
Atypical usage includes, for example, accessing information systems at certain times of the day and from locations that are not consistent with the normal usage patterns of individuals working in organizations.
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |