| SMR-01 |
Security Information and Event Management (SIEM) |
| SMR-02 |
Use behavioral monitoring to detect suspicious behavior |
| SMR-03 |
Use deception technology such as honeypots or honeynets |
| SMR-04 |
Actively monitor 24x7 with a Security Operations Center |
| SMR-05 |
Threat hunting, with activities documented in a log |
| SMR-06 |
Use SOAR or another type of automated response to mitigate malicious activity |
| SMR-07 |
Review security dashboards (e.g. Microsoft Secure Score and AWS Trusted Advisor) |
| SMR-08 |
Toxic combination: Data exfiltration attempts
Alert when user attempts X of the following within Y hours: |
| SMR-08a |
Attempts to access personal e-mail (e.g. Gmail) |
| SMR-08b |
Attempts to access Internet drive storage (e.g. Dropbox) |
| SMR-08c |
Attempts to use a file transfer protocol outbound (e.g. FTP) |
| SMR-08d |
Attempts to access external drive storage (e.g. USB drive) |
| SMR-08e |
Attempts to send encrypted zip file |
| SMR-08f |
Sends a file to a printer |
| SMR-09 |
Alert when an account is added to the domain admin group |
| SMR-10 |
Alert on admin activity late in the night |
| SMR-11 |
Alert on service accounts performing interactive logins |
| SMR-12 |
Alert when two systems communicate and that has not occurred within the past
two months |
| SMR-13 |
Alert when a system attempts to resolve DNS from the Internet versus the expected
path of an internal DNS server or web filter |
| SMR-14 |
Alert when a system stops replicating logs to the SIEM |
| SMR-15 |
Integrate alerts into ticketing system for rapid response |
| SMR-16 |
Enhanced monitoring for privileged users such as system administrators and
finance personnel with the ability to manage funds |
| SMR-17 |
Role-based monitoring for access to sensitive data (e.g. Call center operator
accessing X or more PII records in an hour sends an alert to the supervisor) |
| SMR-18 |
Enhanced monitoring when an employee gives notice |
| SMR-19 |
Review logs for the past month when an employee gives notice |
| SMR-20 |
Enhanced monitoring when an employee receives a significantly negative
performance review, when an employee is subject to disciplinary action or when
an employee is known to be disgruntled |
| SMR-21 |
Search for unstructured data such as PII or PHI on laptops, servers,
network file shares, SharePoint and in non-production environments |
| SMR-22 |
Monitor for sensitive data posted on the dark web |
| SMR-23 |
Monitor social media for company nonpublic information, confidential
information and legal matters |
| SMR-24 |
Conduct infrastructure vulnerability scans (external, internal and authenticated) |
| SMR-25 |
Conduct infrastructure penetration tests annually |
| SMR-26 |
Converge physical and IT security monitoring |
| SMR-27 |
Maintain an Incident response plan w/scenarios |
| SMR-28 |
Include a cloud IRP scenario (shared responsibility model) |
| SMR-29 |
Conduct incident response exercises at least annually |
| SMR-30 |
Subscribe to a data breach response service |
| SMR-31 |
Assess service providers via a Third Party Risk Management Program |
| SMR-32 |
Assess critical business processes subject to insider threat or fraud |
| SMR-33 |
Commission an annual fraud prevention assessment |