7.2 Conduct logging and monitoring activities
- 7.2.1 Intrusion detection and prevention systems (IDPS)
- 7.2.2 Security information and Event Management (SIEM)
- 7.2.3 Security orchestration, automation, and response (SOAR)
- 7.2.4 Continuous Monitoring
- 7.2.5 Egress Monitoring
- 7.2.6 Log Management
- 7.2.7 Threat Intelligence (e.g. Threat feeds, threat hunting)
- 7.2.8 User and Entity Behavior Analytics (UEBA)