The detect function of the SFCS is visually represented as such:
Function | Category | Subcategory |
Detect (DE) | Anomalies and Events (AE) | DE.AE-1: Establish and manage a baseline of network operations and expected data flows for Users and systems |
DE.AE-2: Analyze detected Cybersecurity Events to understand attack targets and methods | ||
DE.AE-3: Collect and correlate Cybersecurity Event data from multiple sources and sensors | ||
DE.AE-4: Determine the impact of Cybersecurity Events | ||
DE.AE-5: Establish Incident alert thresholds | ||
Security Continuous Monitoring (CM) | DE.CM-1: Monitor the network to detect potential Cybersecurity Events | |
DE.CM-2: Monitor the physical environment to detect potential Cybersecurity Events | ||
DE.CM-3: Monitor personnel activity to detect potential Cybersecurity Events | ||
DE.CM-4: Detect malicious code | ||
DE.CM-5: Detect unauthorized mobile code | ||
DE.CM-6: Monitor external service provider activity to detect potential Cybersecurity Events | ||
DE.CM-7: Monitor for unauthorized personnel, connections, devices, and software | ||
DE.CM-8: Perform vulnerability scans | ||
Detection Processes (DP) | DE.DP-1: Define roles and responsibilities for detection to ensure accountability | |
DE.DP-2: Ensure that detection activities comply with all applicable requirements | ||
DE.DP-3: Test detection processes | ||
DE.DP-4: Communicate event detection information to stakeholders that should or must receive this information | ||
DE.DP-5: Continuously improve detection processes |
Such policies and procedures shall:
Fla. Admin. Code Ann. R. 60GG-2.004
Rulemaking Authority 282.318(11) FS. Law Implemented 282.318(3) FS.
New 3-10-16, Amended 1-2-19, Formerly 74-2.004, Amended 9-18-22.