AC-2(12)
AC-2(12): Account Monitoring / Atypical Usage
The organization:
- (a): Monitors information system accounts for [organization-defined atypical usage]; and
- (b): Reports atypical usage of information system accounts to [organization-defined personnel or roles].
Supplemental
Atypical usage includes, for example, accessing information systems at certain times of the day and from locations that are not consistent with the normal usage patterns of individuals working in organizations.
CIA Levels | |
---|---|
Confidentiality | high |
Integrity | high |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |