SMR-01 |
Security Information and Event Management (SIEM) |
SMR-02 |
Use behavioral monitoring to detect suspicious behavior |
SMR-03 |
Use deception technology such as honeypots or honeynets |
SMR-04 |
Actively monitor 24x7 with a Security Operations Center |
SMR-05 |
Threat hunting, with activities documented in a log |
SMR-06 |
Use SOAR or another type of automated response to mitigate malicious activity |
SMR-07 |
Review security dashboards (e.g. Microsoft Secure Score and AWS Trusted Advisor) |
SMR-08 |
Toxic combination: Data exfiltration attempts
Alert when user attempts X of the following within Y hours: |
SMR-08a |
Attempts to access personal e-mail (e.g. Gmail) |
SMR-08b |
Attempts to access Internet drive storage (e.g. Dropbox) |
SMR-08c |
Attempts to use a file transfer protocol outbound (e.g. FTP) |
SMR-08d |
Attempts to access external drive storage (e.g. USB drive) |
SMR-08e |
Attempts to send encrypted zip file |
SMR-08f |
Sends a file to a printer |
SMR-09 |
Alert when an account is added to the domain admin group |
SMR-10 |
Alert on admin activity late in the night |
SMR-11 |
Alert on service accounts performing interactive logins |
SMR-12 |
Alert when two systems communicate and that has not occurred within the past
two months |
SMR-13 |
Alert when a system attempts to resolve DNS from the Internet versus the expected
path of an internal DNS server or web filter |
SMR-14 |
Alert when a system stops replicating logs to the SIEM |
SMR-15 |
Integrate alerts into ticketing system for rapid response |
SMR-16 |
Enhanced monitoring for privileged users such as system administrators and
finance personnel with the ability to manage funds |
SMR-17 |
Role-based monitoring for access to sensitive data (e.g. Call center operator
accessing X or more PII records in an hour sends an alert to the supervisor) |
SMR-18 |
Enhanced monitoring when an employee gives notice |
SMR-19 |
Review logs for the past month when an employee gives notice |
SMR-20 |
Enhanced monitoring when an employee receives a significantly negative
performance review, when an employee is subject to disciplinary action or when
an employee is known to be disgruntled |
SMR-21 |
Search for unstructured data such as PII or PHI on laptops, servers,
network file shares, SharePoint and in non-production environments |
SMR-22 |
Monitor for sensitive data posted on the dark web |
SMR-23 |
Monitor social media for company nonpublic information, confidential
information and legal matters |
SMR-24 |
Conduct infrastructure vulnerability scans (external, internal and authenticated) |
SMR-25 |
Conduct infrastructure penetration tests annually |
SMR-26 |
Converge physical and IT security monitoring |
SMR-27 |
Maintain an Incident response plan w/scenarios |
SMR-28 |
Include a cloud IRP scenario (shared responsibility model) |
SMR-29 |
Conduct incident response exercises at least annually |
SMR-30 |
Subscribe to a data breach response service |
SMR-31 |
Assess service providers via a Third Party Risk Management Program |
SMR-32 |
Assess critical business processes subject to insider threat or fraud |
SMR-33 |
Commission an annual fraud prevention assessment |