Question FIDP-10
Is intrusion monitoring performed internally or by a third-party service?
Weight | 20 |
High Risk | No |
Required | Yes |
Compliant Answer | Yes |
Standard Guidance
In addition to stating your intrusion monitoring strategy, provide a brief summary of its implementation.
Answering "NO"
EDUCAUSE provides no guidance here
Answering "YES"
EDUCAUSE provides no guidance here
Reason for Question
This question is primarily focused on the capability of a vendor's security program. Understanding the size and skillsets of a vendor (taken from other responses) is needed to determine the appropriateness of the vendor's response to this question.
Follow-Up Inquiries
Follow-up inquiries for intrusion monitoring will be institution/implementation specific.
HECVAT Pro Advice
[Add expert insights and best practices]
Implementation Tips
[Add practical steps for SME SaaS vendors]
FAQ
[Add common questions related to this HECVAT item]
Resources
[Add links to relevant articles or tools]