Cyber Wednesday Info Byte #7

The first step to detecting unauthorized access to a system is monitoring and logging of authorized access, a vital part of the Continuous Security Monitoring (DE.CM) process.

Learn more: https://www.nist.gov/cyberframework/framework